VERA-V: Variational Inference Framework for Jailbreaking Vision-Language Models

Authors: Qilin Liao, Anamika Lochab, Ruqi Zhang | Published: 2025-10-20

CrossGuard: Safeguarding MLLMs against Joint-Modal Implicit Malicious Attacks

Authors: Xu Zhang, Hao Li, Zhichao Lu | Published: 2025-10-20

GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models

Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20

Multimodal Safety Is Asymmetric: Cross-Modal Exploits Unlock Black-Box MLLMs Jailbreaks

Authors: Xinkai Wang, Beibei Li, Zerui Shao, Ao Liu, Shouling Ji | Published: 2025-10-20

Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography

Authors: Giulia Giusti | Published: 2025-10-20

QRïS: A Preemptive Novel Method for Quishing Detection Through Structural Features of QR

Authors: Muhammad Wahid Akram, Keshav Sood, Muneeb Ul Hassan | Published: 2025-10-20

OCR-APT: Reconstructing APT Stories from Audit Logs using Subgraph Anomaly Detection and LLMs

Authors: Ahmed Aly, Essam Mansour, Amr Youssef | Published: 2025-10-16 | Updated: 2025-10-20

A Hard-Label Black-Box Evasion Attack against ML-based Malicious Traffic Detection Systems

Authors: Zixuan Liu, Yi Zhao, Zhuotao Liu, Qi Li, Chuanpu Fu, Guangmeng Zhou, Ke Xu | Published: 2025-10-16

Secure Sparse Matrix Multiplications and their Applications to Privacy-Preserving Machine Learning

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2025-10-16

LLM Agents for Automated Web Vulnerability Reproduction: Are We There Yet?

Authors: Bin Liu, Yanjie Zhao, Guoai Xu, Haoyu Wang | Published: 2025-10-16