Attack HIGH
Abdullah Arafat Miah, Kevin Vu, Yu Bi
Spiking Neural Networks (SNNs) are energy-efficient counterparts of Deep Neural Networks (DNNs) with high biological plausibility, as information is...
1 months ago cs.CR cs.AI
PDF
Attack HIGH
Shang Liu, Hanyu Pei, Zeyan Liu
Large Language Models(LLMs) have been successful in numerous fields. Alignment has usually been applied to prevent them from harmful purposes....
1 months ago cs.CR cs.AI
PDF
Tool MEDIUM
Saad Hossain, Tom Tseng, Punya Syon Pandey +8 more
As increasingly capable open-weight large language models (LLMs) are deployed, improving their tamper resistance against unsafe modifications,...
1 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Chen Chen, Yuchen Sun, Jiaxin Gao +4 more
Large language models (LLMs) are increasingly deployed in security-sensitive applications, yet remain vulnerable to backdoor attacks. However,...
Attack HIGH
Zhuoheng Li, Ying Chen
Multimodal large language models (MLLMs) have advanced the capabilities to interpret and act on visual input in 3D environments, empowering diverse...
1 months ago cs.CV cs.AI
PDF
Attack HIGH
Mingqian Feng, Xiaodong Liu, Weiwei Yang +4 more
Multi-turn jailbreaks capture the real threat model for safety-aligned chatbots, where single-turn attacks are merely a special case. Yet existing...
Attack HIGH
Yassine Chagna, Antal Goldschmidt
This project explores large language models (LLMs) for anomaly detection across heterogeneous log sources. Traditional intrusion detection systems...
1 months ago cs.CR cs.AI
PDF
Attack MEDIUM
Fengpeng Li, Kemou Li, Qizhou Wang +2 more
Concept erasure helps stop diffusion models (DMs) from generating harmful content; but current methods face robustness retention trade off....
1 months ago cs.LG cs.AI cs.CR
PDF
Survey MEDIUM
Yunlong Lyu, Yixuan Tang, Peng Chen +4 more
Modern AI-integrated IDEs are shifting from passive code completion to proactive Next Edit Suggestions (NES). Unlike traditional autocompletion, NES...
1 months ago cs.CR cs.HC
PDF
Attack HIGH
Ying Song, Balaji Palanisamy
Graph-structured data underpin a wide spectrum of modern applications. However, complex graph topologies and homophilic patterns can facilitate...
1 months ago cs.CR cs.LG
PDF
Benchmark HIGH
Li Lu, Yanjie Zhao, Hongzhou Rao +2 more
Large Language Models (LLMs) have demonstrated remarkable proficiency in vulnerability detection. However, a critical reliability gap persists:...
Attack HIGH
Mengyao Du, Han Fang, Haokai Ma +4 more
Suffix-based jailbreak attacks append an adversarial suffix, i.e., a short token sequence, to steer aligned LLMs into unsafe outputs. Since suffixes...
Benchmark MEDIUM
Haoyang Hu, Zhejun Jiang, Yueming Lyu +3 more
Retrieval-augmented generation (RAG) is increasingly deployed in real-world applications, where its reference-grounded design makes outputs appear...
1 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Yi Liu, Zhihao Chen, Yanjun Zhang +5 more
Third-party agent skills extend LLM-based agents with instruction files and executable code that run on users' machines. Skills execute with user...
1 months ago cs.CR cs.AI cs.CL
PDF
Defense MEDIUM
Hema Karnam Surendrababu, Nithin Nagaraj
Machine Learning (ML) models, including Large Language Models (LLMs), are characterized by a range of system-level attributes such as security and...
Attack HIGH
Haipeng Li, Rongxuan Peng, Anwei Luo +3 more
The rapid advancement of AI-Generated Content (AIGC) technologies poses significant challenges for authenticity assessment. However, existing...
1 months ago cs.CV cs.CR
PDF
Attack HIGH
Minkyoo Song, Jaehan Kim, Myungchul Kang +3 more
Graph-based retrieval-augmented generation (Graph RAG) is increasingly deployed to support LLM applications by augmenting user queries with...
Attack HIGH
Sung-Hoon Yoon, Ruizhi Qian, Minda Zhao +2 more
Large Language Models (LLMs) have become integral to many domains, making their safety a critical priority. Prior jailbreaking research has explored...
1 months ago cs.CL cs.AI cs.CR
PDF
Tool MEDIUM
Guowei Guan, Yurong Hao, Jiaming Zhang +6 more
Multimodal large language models (MLLMs) are pushing recommender systems (RecSys) toward content-grounded retrieval and ranking via cross-modal...
Attack LOW
Mona Rajhans, Vishal Khawarey
Machine learning (ML) models are increasingly deployed in cybersecurity applications such as phishing detection and network intrusion prevention....
1 months ago cs.CR cs.AI cs.LG
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial