Security label

Co-RedTeam: Orchestrated Security Discovery and Exploitation with LLM Agents

Authors: Pengfei He, Ash Fox, Lesly Miculicich, Stefan Friedli, Daniel Fabian, Burak Gokturk, Jiliang Tang, Chen-Yu Lee, Tomas Pfister, Long T. Le | Published: 2026-02-02
Security of Code Generation
Security label
脆弱性評価

Human Society-Inspired Approaches to Agentic AI Security: The 4C Framework

Authors: Alsharif Abuadbba, Nazatul Sultan, Surya Nepal, Sanjay Jha | Published: 2026-02-02
Relationship of AI Systems
Security label
Framework

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Authors: Lukas Wutschitz, Boris Köpf, Andrew Paverd, Saravan Rajmohan, Ahmed Salem, Shruti Tople, Santiago Zanella-Béguelin, Menglin Xia, Victor Rühle | Published: 2023-11-27
Security label
Privacy Protection
Information Flow Control

MLSMM: Machine Learning Security Maturity Model

Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28
AI Compliance
Security label
Threat modeling

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

Authors: Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner | Published: 2023-04-01 | Updated: 2023-08-09
Security label
Prompt Injection
Vulnerability detection

Do Software Security Practices Yield Fewer Vulnerabilities?

Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15
Security label
Data Extraction and Analysis
Dynamic Vulnerability Management

Anomaly detection optimization using big data and deep learning to reduce false-positive

Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28
Security label
Data Protection Method
Deep Learning Method

Talking Trojan: Analyzing an Industry-Wide Disclosure

Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22
Open Source Disclosure
Security label
Vulnerability Attack Method

Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support

Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31
Security label
Data Protection Method
Data Integrity Constraints

Adversarial Machine Learning — Industry Perspectives

Authors: Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia | Published: 2020-02-04 | Updated: 2021-03-19
Security Testing
Security label
Membership Inference