Data-Driven Vulnerability Assessment

An Empirical Study on Remote Code Execution in Machine Learning Model Hosting Ecosystems

Authors: Mohammed Latif Siddiq, Tanzim Hossain Romel, Natalie Sekerak, Beatrice Casey, Joanna C. S. Santos | Published: 2026-01-20
Security Assurance
Data-Driven Vulnerability Assessment
Model Extraction Attack

Full-Stack Knowledge Graph and LLM Framework for Post-Quantum Cyber Readiness

Authors: Rasmus Erlemann, Charles Colyer Morris, Sanjyot Sathe | Published: 2026-01-07
Data-Driven Vulnerability Assessment
知識グラフ設計
脆弱性優先順位付け

Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects?

Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29
Security Analysis Method
Data-Driven Vulnerability Assessment
Prompt leaking

Large Language Models Cannot Reliably Detect Vulnerabilities in JavaScript: The First Systematic Benchmark and Evaluation

Authors: Qingyuan Fei, Xin Liu, Song Li, Shujiang Wu, Jianwei Hou, Ping Chen, Zifeng Kang | Published: 2025-12-01
Cybersecurity
Data-Driven Vulnerability Assessment
Hallucination

RESCUE: Retrieval Augmented Secure Code Generation

Authors: Jiahao Shi, Tianyi Zhang | Published: 2025-10-21
Poisoning attack on RAG
Data-Driven Vulnerability Assessment
Prompt leaking

Medical Image De-Identification Benchmark Challenge

Authors: Linmin Pei, Granger Sutton, Michael Rutherford, Ulrike Wagner, Tracy Nolan, Kirk Smith, Phillip Farmer, Peter Gu, Ambar Rana, Kailing Chen, Thomas Ferleman, Brian Park, Ye Wu, Jordan Kojouharov, Gargi Singh, Jon Lemon, Tyler Willis, Milos Vukadinovic, Grant Duffy, Bryan He, David Ouyang, Marco Pereanez, Daniel Samber, Derek A. Smith, Christopher Cannistraci, Zahi Fayad, David S. Mendelson, Michele Bufano, Elmar Kotter, Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden, Christopher Ablett, Silvia Siggillino, Sandeep Kaushik, Hongzhu Jiang, Sihan Xie, Zhiyu Wan, Alex Michie, Simon J Doran, Angeline Aurelia Waly, Felix A. Nathaniel Liang, Humam Arshad Mustagfirin, Michelle Grace Felicia, Kuo Po Chih, Rahul Krish, Ghulam Rasool, Nidhal Bouaynaya, Nikolas Koutsoubis, Kyle Naddeo, Kartik Pandit, Tony O'Sullivan, Raj Krish, Qinyan Pan, Scott Gustafson, Benjamin Kopchick, Laura Opsahl-Ong, Andrea Olvera-Morales, Jonathan Pinney, Kathryn Johnson, Theresa Do, Juergen Klenk, Maria Diaz, Arti Singh, Rong Chai, David A. Clunie, Fred Prior, Keyvan Farahani | Published: 2025-07-31
Data-Driven Vulnerability Assessment
測定手法の選択
Watermark Robustness

SALAD: Systematic Assessment of Machine Unlearning on LLM-Aided Hardware Design

Authors: Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-06-02 | Updated: 2025-08-05
Data-Driven Vulnerability Assessment
Prompt leaking
Watermark

A Survey on Data-driven Software Vulnerability Assessment and Prioritization

Authors: Triet H. M. Le, Huaming Chen, M. Ali Babar | Published: 2021-07-18 | Updated: 2022-04-04
Data-Driven Vulnerability Assessment
Multi-Class Classification
Vulnerability Assessment Method

Poisoning the Search Space in Neural Architecture Search

Authors: Robert Wu, Nayan Saxena, Rohan Jain | Published: 2021-06-28
Data-Driven Vulnerability Assessment
Efficiency Evaluation
Machine Learning Algorithm

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification

Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03
Watermarking
Data-Driven Vulnerability Assessment
Trust Evaluation Module