Benchmark MEDIUM
Aink Acrie Soe Thein, Nikolaos Pitropakis, Pavlos Papadopoulos +2 more
With the adoption of multiple digital devices in everyday life, the cyber-attack surface has increased. Adversaries are continuously exploring new...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Xinye Cao, Yihan Lin, Guoshun Nan +9 more
Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management, providing the scalability...
3 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Sohely Jahan, Ruimin Sun
As medical large language models (LLMs) become increasingly integrated into clinical workflows, concerns around alignment robustness, and safety are...
Attack MEDIUM
Miranda Christ, Noah Golowich, Sam Gunn +2 more
Watermarks are an essential tool for identifying AI-generated content. Recently, Christ and Gunn (CRYPTO '24) introduced pseudorandom...
Defense MEDIUM
Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong
Underground mining operations depend on sensor networks to monitor critical parameters such as temperature, gas concentration, and miner movement,...
3 months ago cs.CR cs.LG
PDF
Attack MEDIUM
Botao 'Amber' Hu, Bangdao Chen
The emerging "agentic web" envisions large populations of autonomous agents coordinating, transacting, and delegating across open networks. Yet many...
3 months ago cs.CY cs.MA
PDF
Benchmark MEDIUM
Gary Ackerman, Zachary Kallenborn, Anna Wetzel +7 more
The potential for rapidly-evolving frontier artificial intelligence (AI) models, especially large language models (LLMs), to facilitate bioterrorism...
3 months ago cs.LG cs.AI cs.CY
PDF
Other MEDIUM
Xiaoqi Li, Lei Xie, Wenkai Li +1 more
In the case of upgrading smart contracts on blockchain systems, it is essential to consider the continuity of upgrades and subsequent maintenance. In...
Survey MEDIUM
Shiva Gaire, Srijan Gyawali, Saroj Mishra +3 more
The Model Context Protocol (MCP) has emerged as the de facto standard for connecting Large Language Models (LLMs) to external data and tools,...
3 months ago cs.CR cs.AI
PDF
Benchmark MEDIUM
Md Nazmul Haque, Elizabeth Lin, Lawrence Arkoh +2 more
Large Language Models for code (LLMs4Code) are increasingly used to generate software artifacts, including library and package recommendations in...
Benchmark MEDIUM
Lukas Johannes Möller
The escalating sophistication and variety of cyber threats have rendered static honeypots inadequate, necessitating adaptive, intelligence-driven...
3 months ago cs.CR cs.DC cs.LG
PDF
Benchmark MEDIUM
Jordan Taylor, Sid Black, Dillon Bowen +10 more
Future AI systems could conceal their capabilities ('sandbagging') during evaluations, potentially misleading developers and auditors. We...
Benchmark MEDIUM
JV Roig
We investigate how large language models (LLMs) fail when operating as autonomous agents with tool-use capabilities. Using the Kamiwaza Agentic Merit...
3 months ago cs.AI cs.SE
PDF
Benchmark MEDIUM
Qiwei Tian, Chenhao Lin, Zhengyu Zhao +1 more
To address the trade-off between robustness and performance for robust VLM, we observe that function words could incur vulnerability of VLMs against...
3 months ago cs.LG cs.CL
PDF
Tool MEDIUM
Fenghua Weng, Chaochao Lu, Xia Hu +2 more
As multimodal reasoning improves the overall capabilities of Large Vision Language Models (LVLMs), recent studies have begun to explore...
3 months ago cs.CV cs.CL
PDF
Attack MEDIUM
George Mikros
Large language models (LLMs) present a dual challenge for forensic linguistics. They serve as powerful analytical tools enabling scalable corpus...
3 months ago cs.CL cs.CY
PDF
Survey MEDIUM
Guanquan Shi, Haohua Du, Zhiqiang Wang +4 more
Large Language Models (LLMs) are evolving into autonomous agents capable of executing complex workflows via standardized protocols (e.g., MCP)....
3 months ago cs.CR cs.AI
PDF
Defense MEDIUM
Wenjie Zhang, Yun Lin, Chun Fung Amos Kwok +5 more
Detecting the anomalies of web applications, important infrastructures for running modern companies and governments, is crucial for providing...
3 months ago cs.SE cs.CR cs.DB
PDF
Defense MEDIUM
Xiaoqi Li, Hailu Kuang, Wenkai Li +2 more
Traditional approaches for smart contract analysis often rely on intermediate representations such as abstract syntax trees, control-flow graphs, or...
Attack MEDIUM
Sima Jafarikhah, Daniel Thompson, Eva Deans +2 more
Manual vulnerability scoring, such as assigning Common Vulnerability Scoring System (CVSS) scores, is a resource-intensive process that is often...
3 months ago cs.CR cs.AI cs.PL
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial