ai-security-papers-guide

AI security papers from top-4 security conferences

191 stars

Best use case

ai-security-papers-guide is best used when you need a repeatable AI agent workflow instead of a one-off prompt.

AI security papers from top-4 security conferences

Teams using ai-security-papers-guide should expect a more consistent output, faster repeated execution, less prompt rewriting.

When to use this skill

  • You want a reusable workflow that can be run more than once with consistent structure.

When not to use this skill

  • You only need a quick one-off answer and do not need a reusable workflow.
  • You cannot install or maintain the underlying files, dependencies, or repository context.

Installation

Claude Code / Cursor / Codex

$curl -o ~/.claude/skills/ai-security-papers-guide/SKILL.md --create-dirs "https://raw.githubusercontent.com/wentorai/research-plugins/main/skills/domains/cs/ai-security-papers-guide/SKILL.md"

Manual Installation

  1. Download SKILL.md from GitHub
  2. Place it in .claude/skills/ai-security-papers-guide/SKILL.md inside your project
  3. Restart your AI agent — it will auto-discover the skill

How ai-security-papers-guide Compares

Feature / Agentai-security-papers-guideStandard Approach
Platform SupportNot specifiedLimited / Varies
Context Awareness High Baseline
Installation ComplexityUnknownN/A

Frequently Asked Questions

What does this skill do?

AI security papers from top-4 security conferences

Where can I find the source code?

You can find the source code on GitHub using the link provided at the top of the page.

SKILL.md Source

# AI Security Papers Guide (BIG4 Venues)

## Overview

A curated collection of AI security papers from the top-4 security conferences: IEEE S&P, ACM CCS, USENIX Security, and NDSS. Covers adversarial attacks, model stealing, data poisoning, privacy attacks, deepfake detection, and LLM security. Organized by year and venue, focusing exclusively on peer-reviewed work from these prestigious venues.

## Venues

| Venue | Full Name | Focus |
|-------|-----------|-------|
| **S&P** | IEEE Symposium on Security and Privacy | Broad security + privacy |
| **CCS** | ACM Conference on Computer and Communications Security | Systems security |
| **USENIX** | USENIX Security Symposium | Systems + network security |
| **NDSS** | Network and Distributed System Security | Network security |

## Topic Categories

```
AI Security (BIG4)
├── Adversarial ML
│   ├── Evasion attacks (adversarial examples)
│   ├── Poisoning attacks (backdoors, trojans)
│   ├── Model stealing (extraction, distillation)
│   └── Defenses (certified robustness, detection)
├── Privacy Attacks
│   ├── Membership inference
│   ├── Model inversion
│   ├── Attribute inference
│   └── Training data extraction
├── LLM Security
│   ├── Prompt injection
│   ├── Jailbreaking
│   ├── Data leakage
│   └── Alignment attacks
├── Deepfakes
│   ├── Generation methods
│   ├── Detection techniques
│   └── Watermarking
└── Federated Learning Security
    ├── Byzantine attacks
    ├── Gradient leakage
    └── Secure aggregation
```

## Key Papers by Year

```python
# Recent highlights
papers_2024_2025 = [
    {"title": "Not What You've Signed Up For: "
              "Compromising Real-World LLM-Integrated Applications",
     "venue": "S&P 2024", "topic": "LLM security"},
    {"title": "Prompt Stealing Attacks Against "
              "Text-to-Image Generation Models",
     "venue": "S&P 2024", "topic": "Prompt extraction"},
    {"title": "Backdoor Attacks on Language Models",
     "venue": "CCS 2024", "topic": "NLP backdoors"},
    {"title": "Membership Inference in LLMs",
     "venue": "USENIX 2024", "topic": "Privacy"},
]

for p in papers_2024_2025:
    print(f"[{p['venue']}] {p['title']}")
    print(f"  Topic: {p['topic']}")
```

## Research Trends

```markdown
### Emerging Areas (2024-2025)
1. **LLM security** — Jailbreaking, prompt injection, agent attacks
2. **Supply chain attacks** — Poisoned models, malicious packages
3. **Multi-modal attacks** — Cross-modal adversarial examples
4. **Agent security** — Attacks on LLM-based autonomous systems
5. **Watermarking** — LLM output detection, IP protection
6. **Unlearning** — Machine unlearning verification and attacks
```

## Use Cases

1. **Security research**: Find state-of-the-art attack/defense methods
2. **Threat modeling**: Understand AI system vulnerabilities
3. **Literature review**: Systematic coverage of BIG4 AI security
4. **Course material**: Graduate-level AI security curriculum
5. **Red teaming**: Learn evaluation techniques for AI systems

## References

- [Awesome-AI-Security-BIG4](https://github.com/Zhou-Zi7/Awesome-AI-Security-BIG4)
- [IEEE S&P](https://www.ieee-security.org/TC/SP-Index.html)
- [ACM CCS](https://www.sigsac.org/ccs/)