Benchmark MEDIUM
Aink Acrie Soe Thein, Nikolaos Pitropakis, Pavlos Papadopoulos +2 more
With the adoption of multiple digital devices in everyday life, the cyber-attack surface has increased. Adversaries are continuously exploring new...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Xinye Cao, Yihan Lin, Guoshun Nan +9 more
Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management, providing the scalability...
3 months ago cs.CR cs.AI
PDF
Benchmark HIGH
Futa Waseda, Shojiro Yamabe, Daiki Shiono +2 more
Large vision-language models (LVLMs) are vulnerable to typographic attacks, where misleading text within an image overrides visual understanding....
Benchmark LOW
Bethel Hall, Owen Ungaro, William Eiers
Access control policies are vital for securing modern cloud computing, where organizations must manage access to sensitive data across thousands of...
3 months ago cs.DC cs.CR cs.SE
PDF
Benchmark LOW
Anantaa Kotal, Anupam Joshi
The widespread use of big data across sectors has raised major privacy concerns, especially when sensitive information is shared or analyzed....
3 months ago cs.LG cs.AI cs.CR
PDF
Benchmark LOW
Shuyue Hu, Haoyang Yan, Yiqun Zhang +3 more
Foundation models (FMs) are increasingly assuming the role of the ''brain'' of AI agents. While recent efforts have begun to equip FMs with native...
3 months ago cs.AI cs.MA
PDF
Benchmark LOW
Manos Plitsis, Giorgos Bouritsas, Vassilis Katsouros +1 more
Text-to-image (TTI) diffusion models have achieved remarkable visual quality, yet they have been repeatedly shown to exhibit social biases across...
Benchmark MEDIUM
Gary Ackerman, Zachary Kallenborn, Anna Wetzel +7 more
The potential for rapidly-evolving frontier artificial intelligence (AI) models, especially large language models (LLMs), to facilitate bioterrorism...
3 months ago cs.LG cs.AI cs.CY
PDF
Benchmark MEDIUM
Md Nazmul Haque, Elizabeth Lin, Lawrence Arkoh +2 more
Large Language Models for code (LLMs4Code) are increasingly used to generate software artifacts, including library and package recommendations in...
Benchmark MEDIUM
Lukas Johannes Möller
The escalating sophistication and variety of cyber threats have rendered static honeypots inadequate, necessitating adaptive, intelligence-driven...
3 months ago cs.CR cs.DC cs.LG
PDF
Benchmark MEDIUM
Jordan Taylor, Sid Black, Dillon Bowen +10 more
Future AI systems could conceal their capabilities ('sandbagging') during evaluations, potentially misleading developers and auditors. We...
Benchmark LOW
Sangha Park, Seungryong Yoo, Jisoo Mok +1 more
Although Multimodal Large Language Models (MLLMs) have advanced substantially, they remain vulnerable to object hallucination caused by language...
3 months ago cs.CV cs.AI
PDF
Benchmark LOW
Alisha Ukani, Hamed Haddadi, Ali Shahin Shamsabadi +1 more
This paper presents a systematic evaluation of the privacy behaviors and attributes of eight recent, popular browser agents. Browser agents are...
Benchmark MEDIUM
JV Roig
We investigate how large language models (LLMs) fail when operating as autonomous agents with tool-use capabilities. Using the Kamiwaza Agentic Merit...
3 months ago cs.AI cs.SE
PDF
Benchmark MEDIUM
Qiwei Tian, Chenhao Lin, Zhengyu Zhao +1 more
To address the trade-off between robustness and performance for robust VLM, we observe that function words could incur vulnerability of VLMs against...
3 months ago cs.LG cs.CL
PDF
Benchmark HIGH
Xiaojun Jia, Jie Liao, Qi Guo +11 more
Recent advances in multi-modal large language models (MLLMs) have enabled unified perception-reasoning capabilities, yet these systems remain highly...
3 months ago cs.CR cs.CV
PDF
Benchmark MEDIUM
Cheng Cheng, Jinqiu Yang
Code-focused Large Language Models (LLMs), such as CodeX and Star-Coder, have demonstrated remarkable capabilities in enhancing developer...
Benchmark HIGH
Caleb Gross
Security research is fundamentally a problem of resource constraint and consequent prioritization. There is simply too much attack surface and too...
3 months ago cs.CR cs.IR
PDF
Benchmark HIGH
Xiuyuan Chen, Jian Zhao, Yuxiang He +10 more
While the deployment of large language models (LLMs) in high-value industries continues to expand, the systematic assessment of their safety against...
Benchmark MEDIUM
Ashish Hooda, Mihai Christodorescu, Chuangang Ren +3 more
Machine learning (ML) models for code clone detection determine whether two pieces of code are semantically equivalent, which in turn is a key...
3 months ago cs.SE cs.AI
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial