Attack MEDIUM
Thomas Fargues, Ye Dong, Tianwei Zhang +1 more
The rapid growth of Large Language Models (LLMs) has highlighted the pressing need for reliable mechanisms to verify content ownership and ensure...
Attack HIGH
Zhifang Zhang, Qiqi Tao, Jiaqi Lv +3 more
Large vision-language models (LVLMs) have achieved impressive performance across a wide range of vision-language tasks, while they remain vulnerable...
Survey LOW
Wenjie Fu, Huandong Wang, Junyao Gao +2 more
As Large Language Models (LLMs) achieve remarkable success across a wide range of applications, such as chatbots and code copilots, concerns...
5 months ago cs.CL cs.CR cs.LG
PDF
Attack MEDIUM
Yuzhen Long, Songze Li
Autonomous driving systems increasingly rely on multi-agent architectures powered by large language models (LLMs), where specialized agents...
5 months ago cs.CR cs.LG
PDF
Attack MEDIUM
Jongwook Han, Jongwon Lim, Injin Kong +1 more
Large language models can express values in two main ways: (1) intrinsic expression, reflecting the model's inherent values learned during training,...
5 months ago cs.CL cs.AI
PDF
Defense MEDIUM
Zherui Li, Zheng Nie, Zhenhong Zhou +7 more
The rapid advancement of Diffusion Large Language Models (dLLMs) introduces unprecedented vulnerabilities that are fundamentally distinct from...
5 months ago cs.CL cs.AI
PDF
Survey HIGH
Weibo Zhao, Jiahao Liu, Bonan Ruan +2 more
Model Context Protocol (MCP) servers enable AI applications to connect to external systems in a plug-and-play manner, but their rapid proliferation...
5 months ago cs.CR cs.SE
PDF
Attack MEDIUM
Zihao Zhu, Xinyu Wu, Gehan Hu +3 more
Large Reasoning Models (LRMs) have demonstrated remarkable capabilities in complex problem-solving through Chain-of-Thought (CoT) reasoning. However,...
5 months ago cs.AI cs.CL
PDF
Benchmark MEDIUM
Su Kara, Fazle Faisal, Suman Nath
Recent advances in browser-based LLM agents have shown promise for automating tasks ranging from simple form filling to hotel booking or online...
5 months ago cs.AI cs.CR cs.LG
PDF
Benchmark MEDIUM
Yihan Wu, Ruibo Chen, Georgios Milis +1 more
As large language models become increasingly capable and widely deployed, verifying the provenance of machine-generated content is critical to...
Benchmark HIGH
Alireza Lotfi, Charalampos Katsis, Elisa Bertino
Software vulnerabilities remain a critical security challenge, providing entry points for attackers into enterprise networks. Despite advances in...
Defense MEDIUM
Gauri Kholkar, Ratinder Ahuja
As autonomous AI agents are used in regulated and safety-critical settings, organizations need effective ways to turn policy into enforceable...
5 months ago cs.CL cs.AI
PDF
Benchmark MEDIUM
Meet Udeshi, Venkata Sai Charan Putrevu, Prashanth Krishnamurthy +4 more
Security of software supply chains is necessary to ensure that software updates do not contain maliciously injected code or introduce vulnerabilities...
Benchmark MEDIUM
Shuyi Lin, Tian Lu, Zikai Wang +3 more
OpenAI's GPT-OSS family provides open-weight language models with explicit chain-of-thought (CoT) reasoning and a Harmony prompt format. We summarize...
5 months ago cs.AI cs.CR
PDF
Benchmark LOW
Nayeong Kim, Seong Joon Oh, Suha Kwak
Parameter-efficient fine-tuning (PEFT) of vision-language models (VLMs) excels in various vision tasks thanks to the rich knowledge and...
5 months ago cs.CV cs.AI
PDF
Benchmark HIGH
Jianshuo Dong, Sheng Guo, Hao Wang +6 more
Search agents connect LLMs to the Internet, enabling them to access broader and more up-to-date information. However, this also introduces a new...
5 months ago cs.AI cs.CL cs.CR
PDF
Benchmark MEDIUM
Sihan Hu, Xiansheng Cai, Yuan Huang +5 more
Training large language models with Reinforcement Learning with Verifiable Rewards (RLVR) exhibits a set of distinctive and puzzling behaviors that...
5 months ago cs.AI cond-mat.dis-nn cond-mat.stat-mech
PDF
Benchmark MEDIUM
Sherif Saad, Kevin Shi, Mohammed Mamun +1 more
Automated machine learning (AutoML) has emerged as a promising paradigm for automating machine learning (ML) pipeline design, broadening AI adoption....
Attack HIGH
Yixu Wang, Yan Teng, Yingchun Wang +1 more
Parameter-Efficient Fine-Tuning (PEFT) methods like LoRA have transformed vision model adaptation, enabling the rapid deployment of customized...
5 months ago cs.CR cs.CV
PDF
Defense MEDIUM
Yuqiao Meng, Luoxi Tang, Feiyang Yu +4 more
Large language models (LLMs) are increasingly used to help security analysts manage the surge of cyber threats, automating tasks from vulnerability...
5 months ago cs.CR cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial