Attack MEDIUM
Haoyang Li, Mingjin Li, Jinxin Zuo +5 more
LLM-based code agents(e.g., ChatGPT Codex) are increasingly deployed as detector for code review and security auditing tasks. Although CoT-enhanced...
3 months ago cs.CR cs.MA
PDF
Attack HIGH
Xinjie Xu, Shuyu Cheng, Dongwei Xu +2 more
In hard-label black-box adversarial attacks, where only the top-1 predicted label is accessible, the prohibitive query complexity poses a major...
3 months ago cs.LG cs.AI cs.CR
PDF
Attack MEDIUM
Ahmed M. Hussain, Salahuddin Salahuddin, Panos Papadimitratos
Current Large Language Models (LLMs) safety approaches focus on explicitly harmful content while overlooking a critical vulnerability: the inability...
3 months ago cs.AI cs.CL cs.CR
PDF
Attack HIGH
Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami +2 more
Mixture-of-Experts (MoE) architectures have advanced the scaling of Large Language Models (LLMs) by activating only a sparse subset of parameters per...
Attack HIGH
Yihan Wang, Huanqi Yang, Shantanu Pal +1 more
The integration of Large Language Models (LLMs) into wearable sensing is creating a new class of mobile applications capable of nuanced human...
Attack MEDIUM
Yifan Yao, Baojuan Wang, Jinhao Duan +4 more
Chat-based cybercrime has emerged as a pervasive threat, with attackers leveraging real-time messaging platforms to conduct scams that rely on...
Attack HIGH
Omer Gazit, Yael Itzhakev, Yuval Elovici +1 more
Radio frequency (RF) based systems are increasingly used to detect drones by analyzing their RF signal patterns, converting them into spectrogram...
3 months ago cs.CR cs.LG
PDF
Attack MEDIUM
Honglin Mu, Jinghao Liu, Kaiyang Wan +4 more
Large Language Models (LLMs) excel at text comprehension and generation, making them ideal for automated tasks like code review and content...
3 months ago cs.CL cs.AI
PDF
Attack MEDIUM
Rahul Yumlembam, Biju Issac, Seibu Mary Jacob +1 more
Since the Internet of Things (IoT) is widely adopted using Android applications, detecting malicious Android apps is essential. In recent years,...
3 months ago cs.CR cs.AI cs.LG
PDF
Attack MEDIUM
Samruddhi Baviskar
Machine learning models used in financial decision systems operate in nonstationary economic environments, yet adversarial robustness is typically...
3 months ago cs.LG cs.AI cs.CR
PDF
Attack MEDIUM
A. A. Gde Yogi Pramana, Jason Ray, Anthony Jaya +1 more
Vision--Language Models (VLMs) show significant promise for Medical Visual Question Answering (VQA), yet their deployment in clinical settings is...
Attack HIGH
Linzhi Chen, Yang Sun, Hongru Wei +1 more
Low-Rank Adaptation (LoRA) has emerged as an efficient method for fine-tuning large language models (LLMs) and is widely adopted within the...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Sameera K. M., Serena Nicolazzo, Antonino Nocera +2 more
Federated Learning (FL) has recently emerged as a revolutionary approach to collaborative training Machine Learning models. In particular, it enables...
3 months ago cs.CR cs.LG
PDF
Attack HIGH
Akshaj Prashanth Rao, Advait Singh, Saumya Kumaar Saksena +1 more
Prompt injection and jailbreaking attacks pose persistent security challenges to large language model (LLM)-based systems. We present PromptScreen,...
3 months ago cs.CR cs.AI cs.CL
PDF
Attack HIGH
Jianyi Zhang, Shizhao Liu, Ziyin Zhou +1 more
The rapid advancement of large language models (LLMs) has intensified concerns about the robustness of their safety alignment. While existing...
Attack MEDIUM
Tung-Ling Li, Yuhao Wu, Hongliang Liu
Reward models and LLM-as-a-Judge systems are central to modern post-training pipelines such as RLHF, DPO, and RLAIF, where they provide scalar...
3 months ago cs.LG cs.CL cs.CR
PDF
Attack MEDIUM
Yidong Chai, Yi Liu, Mohammadreza Ebrahimi +2 more
Social media platforms are plagued by harmful content such as hate speech, misinformation, and extremist rhetoric. Machine learning (ML) models are...
Attack HIGH
Huixin Zhan
Genomic Foundation Models (GFMs), such as Evolutionary Scale Modeling (ESM), have demonstrated remarkable success in variant effect prediction....
3 months ago cs.CR cs.LG q-bio.QM
PDF
Attack LOW
Tomáš Souček, Pierre Fernandez, Hady Elsahar +5 more
Invisible watermarking is essential for tracing the provenance of digital content. However, training state-of-the-art models remains notoriously...
3 months ago cs.CV cs.AI cs.CR
PDF
Attack HIGH
Kai Hu, Abhinav Aggarwal, Mehran Khodabandeh +6 more
This paper introduces Jailbreak-Zero, a novel red teaming methodology that shifts the paradigm of Large Language Model (LLM) safety evaluation from a...
3 months ago cs.CL cs.CR cs.LG
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial