GuardTrace-VL: Detecting Unsafe Multimodel Reasoning via Iterative Safety Supervision Authors: Yuxiao Xiang, Junchi Chen, Zhenchao Jin, Changtao Miao, Haojie Yuan, Qi Chu, Tao Gong, Nenghai Yu | Published: 2025-11-26 Prompt InjectionRisk Assessment MethodEthical Considerations 2025.11.26 2025.11.28 Literature Database
Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion Authors: Yu Cui, Yifei Liu, Hang Fu, Sicheng Pan, Haibin Zhang, Cong Zuo, Licheng Wang | Published: 2025-11-24 Indirect Prompt InjectionPrompt InjectionRisk Assessment Method 2025.11.24 2025.11.26 Literature Database
LLM-CSEC: Empirical Evaluation of Security in C/C++ Code Generated by Large Language Models Authors: Muhammad Usman Shahid, Chuadhry Mujeeb Ahmed, Rajiv Ranjan | Published: 2025-11-24 Automation of CybersecurityPrompt leakingRisk Assessment Method 2025.11.24 2025.11.26 Literature Database
DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21 UI分析Risk Assessment MethodMalicious Website Detection 2025.10.21 2025.10.23 Literature Database
AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models Authors: Anthony M. Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman | Published: 2025-06-30 Model InversionRisk Assessment MethodEducation and Follow-up 2025.06.30 2025.07.02 Literature Database
LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries Authors: Zekun Wu, Seonglae Cho, Umar Mohammed, Cristian Munoz, Kleyton Costa, Xin Guan, Theo King, Ze Wang, Emre Kazim, Adriano Koshiyama | Published: 2025-05-13 | Updated: 2025-06-30 Indirect Prompt InjectionRisk Assessment Method依存関係管理 2025.05.13 2025.07.02 Literature Database
Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13 Privacy Enhancing TechnologyRisk Assessment MethodConvergence Property 2023.03.13 2025.05.28 Literature Database
Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05 Data Origins and EvolutionData Protection MethodRisk Assessment Method 2022.10.05 2025.05.28 Literature Database
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04 Network SlicingRisk Assessment MethodAdversarial Learning 2022.07.04 2025.05.28 Literature Database
Privacy-Preserving Reinforcement Learning Beyond Expectation Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18 Privacy AssessmentRisk Assessment MethodReinforcement Learning Algorithm 2022.03.18 2025.05.28 Literature Database