Risk Assessment Method

GuardTrace-VL: Detecting Unsafe Multimodel Reasoning via Iterative Safety Supervision

Authors: Yuxiao Xiang, Junchi Chen, Zhenchao Jin, Changtao Miao, Haojie Yuan, Qi Chu, Tao Gong, Nenghai Yu | Published: 2025-11-26
Prompt Injection
Risk Assessment Method
Ethical Considerations

Can LLMs Threaten Human Survival? Benchmarking Potential Existential Threats from LLMs via Prefix Completion

Authors: Yu Cui, Yifei Liu, Hang Fu, Sicheng Pan, Haibin Zhang, Cong Zuo, Licheng Wang | Published: 2025-11-24
Indirect Prompt Injection
Prompt Injection
Risk Assessment Method

LLM-CSEC: Empirical Evaluation of Security in C/C++ Code Generated by Large Language Models

Authors: Muhammad Usman Shahid, Chuadhry Mujeeb Ahmed, Rajiv Ranjan | Published: 2025-11-24
Automation of Cybersecurity
Prompt leaking
Risk Assessment Method

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21
UI分析
Risk Assessment Method
Malicious Website Detection

AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models

Authors: Anthony M. Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman | Published: 2025-06-30
Model Inversion
Risk Assessment Method
Education and Follow-up

LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries

Authors: Zekun Wu, Seonglae Cho, Umar Mohammed, Cristian Munoz, Kleyton Costa, Xin Guan, Theo King, Ze Wang, Emre Kazim, Adriano Koshiyama | Published: 2025-05-13 | Updated: 2025-06-30
Indirect Prompt Injection
Risk Assessment Method
依存関係管理

Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13
Privacy Enhancing Technology
Risk Assessment Method
Convergence Property

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05
Data Origins and Evolution
Data Protection Method
Risk Assessment Method

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
Network Slicing
Risk Assessment Method
Adversarial Learning

Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18
Privacy Assessment
Risk Assessment Method
Reinforcement Learning Algorithm