Similar Items: From Beats to Breaches:How Offensive AI Infers Sensitive User Information from Playlists
- The Infinite Mutation Engine? Measuring Polymorphism in LLM-Generated Offensive Code
- Redefining AI Red Teaming in the Agentic Era: From Weeks to Hours
- On the (In-)Security of the Shuffling Defense in the Transformer Secure Inference
- Pop Quiz Attack: Black-box Membership Inference Attacks Against Large Language Models
- PINSIGHT: A Comprehensive Threat Exploration of Domain-Adaptive Wi-Fi based PIN Code Inference
- Engineering Robustness into Personal Agents with the AI Workflow Store