Benchmark LOW
Yash Srivastava, Shalin Jain, Sneha Awathare +1 more
The rising demand for collaborative machine learning and data analytics calls for secure and decentralized data sharing frameworks that balance...
3 months ago cs.CR cs.AI cs.DC
PDF
Defense MEDIUM
Najmul Hasan, Prashanth BusiReddyGari, Haitao Zhao +3 more
Email phishing is one of the most prevalent and globally consequential vectors of cyber intrusion. As systems increasingly deploy Large Language...
3 months ago cs.CR cs.IR
PDF
Attack HIGH
Khurram Khalil, Khaza Anuarul Hoque
Generative Artificial Intelligence models, such as Large Language Models (LLMs) and Large Vision Models (VLMs), exhibit state-of-the-art performance...
3 months ago cs.CR cs.AI
PDF
Attack HIGH
Mohamed Afane, Abhishek Satyam, Ke Chen +3 more
Backdoor attacks create significant security threats to language models by embedding hidden triggers that manipulate model behavior during inference,...
3 months ago cs.CR cs.CL
PDF
Benchmark MEDIUM
Jan Betley, Jorio Cocola, Dylan Feng +4 more
LLMs are useful because they generalize so well. But can you have too much of a good thing? We show that a small amount of finetuning in narrow...
3 months ago cs.CL cs.AI cs.CR
PDF
Benchmark MEDIUM
Aink Acrie Soe Thein, Nikolaos Pitropakis, Pavlos Papadopoulos +2 more
With the adoption of multiple digital devices in everyday life, the cyber-attack surface has increased. Adversaries are continuously exploring new...
3 months ago cs.CR cs.LG
PDF
Benchmark MEDIUM
Xinye Cao, Yihan Lin, Guoshun Nan +9 more
Zero-Touch Networks (ZTNs) represent a transformative paradigm toward fully automated and intelligent network management, providing the scalability...
3 months ago cs.CR cs.AI
PDF
Benchmark HIGH
Futa Waseda, Shojiro Yamabe, Daiki Shiono +2 more
Large vision-language models (LVLMs) are vulnerable to typographic attacks, where misleading text within an image overrides visual understanding....
Defense MEDIUM
Sohely Jahan, Ruimin Sun
As medical large language models (LLMs) become increasingly integrated into clinical workflows, concerns around alignment robustness, and safety are...
Attack HIGH
Reachal Wang, Yuqi Jia, Neil Zhenqiang Gong
Prompt injection attacks aim to contaminate the input data of an LLM to mislead it into completing an attacker-chosen task instead of the intended...
Benchmark LOW
Bethel Hall, Owen Ungaro, William Eiers
Access control policies are vital for securing modern cloud computing, where organizations must manage access to sensitive data across thousands of...
3 months ago cs.DC cs.CR cs.SE
PDF
Attack MEDIUM
Miranda Christ, Noah Golowich, Sam Gunn +2 more
Watermarks are an essential tool for identifying AI-generated content. Recently, Christ and Gunn (CRYPTO '24) introduced pseudorandom...
Attack HIGH
Joshua Ward, Bochao Gu, Chi-Hua Wang +1 more
Large Language Models (LLMs) have recently demonstrated remarkable performance in generating high-quality tabular synthetic data. In practice, two...
3 months ago cs.LG cs.AI
PDF
Benchmark LOW
Anantaa Kotal, Anupam Joshi
The widespread use of big data across sectors has raised major privacy concerns, especially when sensitive information is shared or analyzed....
3 months ago cs.LG cs.AI cs.CR
PDF
Defense MEDIUM
Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong
Underground mining operations depend on sensor networks to monitor critical parameters such as temperature, gas concentration, and miner movement,...
3 months ago cs.CR cs.LG
PDF
Benchmark LOW
Shuyue Hu, Haoyang Yan, Yiqun Zhang +3 more
Foundation models (FMs) are increasingly assuming the role of the ''brain'' of AI agents. While recent efforts have begun to equip FMs with native...
3 months ago cs.AI cs.MA
PDF
Attack MEDIUM
Botao 'Amber' Hu, Bangdao Chen
The emerging "agentic web" envisions large populations of autonomous agents coordinating, transacting, and delegating across open networks. Yet many...
3 months ago cs.CY cs.MA
PDF
Benchmark LOW
Manos Plitsis, Giorgos Bouritsas, Vassilis Katsouros +1 more
Text-to-image (TTI) diffusion models have achieved remarkable visual quality, yet they have been repeatedly shown to exhibit social biases across...
Defense HIGH
Dyna Soumhane Ouchebara, Stéphane Dupont
The significant increase in software production, driven by the acceleration of development cycles over the past two decades, has led to a steady rise...
3 months ago cs.SE cs.AI cs.CR
PDF
Benchmark MEDIUM
Gary Ackerman, Zachary Kallenborn, Anna Wetzel +7 more
The potential for rapidly-evolving frontier artificial intelligence (AI) models, especially large language models (LLMs), to facilitate bioterrorism...
3 months ago cs.LG cs.AI cs.CY
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial