Stats and Bytes
Subscribe
Sign in
Home
Archive
About
Latest
Top
🎩 Top 5 Security and AI Reads - Week #19
Language-based backdoor attacks, multi-agent security challenges, cache side-channel token extraction, hierarchical neural network verification, and…
May 11
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #19
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #18
AI red teaming automation wins, reproducible vulnerability containers, attacker control-based bug prioritisation, benchmark gaming exposed, and new…
May 4
1
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #18
Copy link
Facebook
Email
Notes
More
April 2025
🎩 Top 5 Security and AI Reads - Week #17
LLM-powered vulnerability triage, automated malware rule generation, LLM censorship steering, vulnerability detection evaluation, and AI governance…
Apr 27
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #17
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #16
Agentic automated cyber ranges, LLMs classifying CVEs, loss functions in deep learning, trajectory-based data poison detection, and RAG compiler…
Apr 20
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #16
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #15
Model stealing optimization, hardware-locked ML models, LLM robot jailbreaks, black-box attack attribution, and diffusion-based steganography.
Apr 13
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #15
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #14
MCP tool poisoning attacks, AI cyberattack evaluation frameworks, LLM-managed adaptive honeypots, generative AI evaluation science, and energy-latency…
Apr 6
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #14
Copy link
Facebook
Email
Notes
More
March 2025
🎩 Top 5 Security and AI Reads - Week #13
Encrypted traffic SoK, unlearning vulnerabilities survey, privacy-guaranteed synthetic data, side-channel weight recovery, and LLM thought tracing
Mar 30
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #13
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #12
Algebraic explainability attacks, benchmark contamination mitigations, LLM evaluation inconsistencies, efficient model inversion, and targeted image…
Mar 23
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #12
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #11
Repeated token vulnerabilities, LLM finetuning API attack vectors, effective VLM adversarial techniques, autonomous adversarial mitigation exploitation…
Mar 16
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #11
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #10
Jailbreak paper usefulness, PLC binary analysis, black-box LLM origin identification, microcode vulnerability exploration, safety judge evaluation…
Mar 9
1
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #10
Copy link
Facebook
Email
Notes
More
🎩 Top 5 Security and AI Reads - Week #9
Backdoor implants in LLM agents, LLM offensive cyber evaluation, AI assessment paradigms, offensive AI potential, fine-tuning causing misalignment
Mar 2
1
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #9
Copy link
Facebook
Email
Notes
More
February 2025
🎩 Top 5 Security and AI Reads - Week #8
GenAI in cyber operations, obfuscated activations bypass LLM defenses, vulnerability prioritization challenges, machine unlearning backdoor, and…
Feb 23
2
Share this post
Stats and Bytes
🎩 Top 5 Security and AI Reads - Week #8
Copy link
Facebook
Email
Notes
More
Share
Copy link
Facebook
Email
Notes
More
This site requires JavaScript to run correctly. Please
turn on JavaScript
or unblock scripts