STACK: Adversarial Attacks on LLM Safeguard Pipelines
arXiv:2506.24068v3 Announce Type: replace Abstract: Frontier AI developers are relying on layers of safeguards to protect against catastrophic misuse of AI systems. Anthropic and OpenAI...
Stay updated with the latest research and technology news
arXiv:2506.24068v3 Announce Type: replace Abstract: Frontier AI developers are relying on layers of safeguards to protect against catastrophic misuse of AI systems. Anthropic and OpenAI...
arXiv:2507.01028v3 Announce Type: replace Abstract: The {\em stop gradient} and {\em exponential moving average} iterative procedures are commonly used in non-contrastive approaches to self-supervised learning...
arXiv:2507.01885v2 Announce Type: replace Abstract: We consider a region in the complex plane enclosed by a deltoid curve inscribed in the unit circle, and define...
arXiv:2507.04756v3 Announce Type: replace Abstract: Personalization has become crucial for adapting models to the diverse and evolving needs of users across cultural, temporal, and contextual...
arXiv:2507.13579v3 Announce Type: replace Abstract: As everyday use cases of large language model (LLM) AI assistants have expanded, it is becoming increasingly important to personalize...
arXiv:2507.13772v2 Announce Type: replace Abstract: Feature engineering continues to play a critical role in image classification, particularly when interpretability and computational efficiency are prioritized over...
arXiv:2507.15155v3 Announce Type: replace Abstract: This paper introduces a learning-based modeling framework for a magnetically steerable soft suction device designed for endoscopic endonasal brain tumor...
arXiv:2507.15226v2 Announce Type: replace Abstract: Code clone detection plays a critical role in software maintenance and vulnerability analysis. Substantial methods have been proposed to detect...
arXiv:2507.17001v2 Announce Type: replace Abstract: Most approaches to out-of-distribution (OOD) generalization learn domain-invariant representations by discarding contextual bias. In this paper, we raise a critical...
arXiv:2508.01151v3 Announce Type: replace Abstract: Text-to-image diffusion models have revolutionized visual content generation, yet their deployment is hindered by a fundamental limitation: safety mechanisms enforce...
arXiv:2508.02016v4 Announce Type: replace Abstract: Building role-playing agents (RPAs) that faithfully emulate specific characters remains challenging because collecting character-specific utterances and continually updating model parameters...
arXiv:2508.02276v2 Announce Type: replace Abstract: Virtual cell modeling aims to predict cellular responses to diverse perturbations but faces challenges from biological complexity, multimodal data heterogeneity,...
arXiv:2508.05415v2 Announce Type: replace Abstract: Human manipulation skills represent a pinnacle of their voluntary motor functions, requiring the coordination of many degrees of freedom and...
arXiv:2508.06616v2 Announce Type: replace Abstract: With the emergence of 6G, mobile networks are becoming increasingly heterogeneous and dynamic, necessitating advanced automation for efficient management. Intent-Driven...
arXiv:2508.12735v2 Announce Type: replace Abstract: Citation analysis is widely used in research evaluation to assess the impact of scientific papers. These analyses rest on the...
arXiv:2508.12840v3 Announce Type: replace Abstract: Multi-agent Epistemic Planning (MEP) is an autonomous planning framework for reasoning about both the physical world and the beliefs of...
arXiv:2508.14422v3 Announce Type: replace Abstract: This paper introduces a dimension-decomposed geometric learning framework called Sliced Learning for disturbance identification in quadrotor geometric attitude control. Instead...
arXiv:2508.18175v4 Announce Type: replace Abstract: Efficient equilibrium sampling of molecular conformations remains a core challenge in computational chemistry and statistical inference. Classical approaches such as...
arXiv:2508.19345v2 Announce Type: replace Abstract: The increasing deployment of distributed Battery Energy Storage Systems (BESSs) in modern power grids necessitates effective coordination strategies to ensure...
arXiv:2508.19842v2 Announce Type: replace Abstract: We propose a new symplectic convolutional neural network (CNN) architecture by leveraging symplectic neural networks, proper symplectic decomposition, and tensor...
arXiv:2508.21022v2 Announce Type: replace Abstract: Subsampled natural gradient descent (SNG) has been used to enable high-precision scientific machine learning, but standard analyses based on stochastic...
arXiv:2508.21051v3 Announce Type: replace Abstract: According to the United States Internal Revenue Service, ``the average American spends $\$270$ and 13 hours filing their taxes''. Even...
arXiv:2509.03054v3 Announce Type: replace Abstract: Large Language Models (LLMs) deliver strong performance but are difficult to deploy under tight memory and compute constraints. Low-bit post-training...
arXiv:2509.03493v3 Announce Type: replace Abstract: For RL algorithms, appropriate entropy control is crucial to their effectiveness. To control the policy entropy, a commonly used method...