AI Security Research
2,077+ academic papers on AI security, attacks, and defenses
Defense HIGH
Samal Mukhtar, Yinghua Yao, Zhu Sun +3 more
Software vulnerability detection (SVD) is a critical challenge in modern systems. Large language models (LLMs) offer natural-language explanations...
1 months ago cs.SE cs.AI cs.CR
PDF
Defense HIGH
Zihan Wu, Jie Xu, Yun Peng +2 more
Large Language Models (LLMs) struggle to automate real-world vulnerability detection due to two key limitations: the heterogeneity of vulnerability...
1 months ago cs.SE cs.AI
PDF
Defense HIGH
Jonah Ghebremichael, Saastha Vasan, Saad Ullah +6 more
Static Application Security Testing (SAST) tools using taint analysis are widely viewed as providing higher-quality vulnerability detection results...
2 months ago cs.CR cs.SE
PDF
Defense HIGH
Hao Wang, Yanting Wang, Hao Li +2 more
Large Language Models (LLMs) have achieved remarkable capabilities but remain vulnerable to adversarial ``jailbreak'' attacks designed to bypass...
2 months ago cs.CR cs.CL
PDF
Defense HIGH
Yun Bian, Yi Chen, HaiQuan Wang +2 more
Software vulnerability detection can be formulated as a binary classification problem that determines whether a given code snippet contains security...
2 months ago cs.SE cs.AI cs.CR
PDF
Defense HIGH
Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan +2 more
The software supply chain attacks are becoming more and more focused on trusted development and delivery procedures, so the conventional post-build...
2 months ago cs.CR cs.AI
PDF
Defense HIGH
Dyna Soumhane Ouchebara, Stéphane Dupont
The significant increase in software production, driven by the acceleration of development cycles over the past two decades, has led to a steady rise...
3 months ago cs.SE cs.AI cs.CR
PDF
Defense HIGH
Fouad Trad, Ali Chehab
Few-shot prompting has emerged as a practical alternative to fine-tuning for leveraging the capabilities of large language models (LLMs) in...
3 months ago cs.SE cs.AI cs.CL
PDF
Defense HIGH
Jie Chen, Liangmin Wang
Fuzzing is a widely used technique for detecting vulnerabilities in smart contracts, which generates transaction sequences to explore the execution...
4 months ago cs.CR cs.SE
PDF
Defense HIGH
Biagio Boi, Christian Esposito
Smart contracts have emerged as key components within decentralized environments, enabling the automation of transactions through self-executing...
Defense HIGH
Hao Zhu, Jia Li, Cuiyun Gao +7 more
Large language models (LLMs) have achieved remarkable progress in code understanding tasks. However, they demonstrate limited performance in...
4 months ago cs.SE cs.CR
PDF
Defense HIGH
Md Abdul Hannan, Ronghao Ni, Chi Zhang +3 more
Large language models (LLMs) have demonstrated impressive capabilities across a wide range of coding tasks, including summarization, translation,...
4 months ago cs.SE cs.CR cs.LG
PDF
Defense HIGH
Tenghui Huang, Jinbo Wen, Jiawen Kang +8 more
Smart contracts play a significant role in automating blockchain services. Nevertheless, vulnerabilities in smart contracts pose serious threats to...
5 months ago cs.CR cs.AI
PDF
Defense HIGH
Yiyang Huang, Liang Shi, Yitian Zhang +2 more
Large Vision-Language Models (LVLMs) excel in diverse cross-modal tasks. However, object hallucination, where models produce plausible but inaccurate...
5 months ago cs.CV cs.AI
PDF
Defense HIGH
Shojiro Yamabe, Jun Sakuma
Diffusion language models (DLMs) generate tokens in parallel through iterative denoising, which can reduce latency and enable bidirectional...
5 months ago cs.AI cs.LG
PDF
Defense HIGH
Maria Chiper, Radu Tudor Ionescu
Phishing attacks targeting both organizations and individuals are becoming an increasingly significant threat as technology advances. Current...
6 months ago cs.CR cs.AI cs.CL
PDF
Track AI security vulnerabilities in real time
Get breaking CVE alerts, compliance reports (ISO 42001, EU AI Act),
and CISO risk assessments for your AI/ML stack.
Start 14-Day Free Trial