Best use case
ai-security-papers-guide is best used when you need a repeatable AI agent workflow instead of a one-off prompt.
AI security papers from top-4 security conferences
Teams using ai-security-papers-guide should expect a more consistent output, faster repeated execution, less prompt rewriting.
When to use this skill
- You want a reusable workflow that can be run more than once with consistent structure.
When not to use this skill
- You only need a quick one-off answer and do not need a reusable workflow.
- You cannot install or maintain the underlying files, dependencies, or repository context.
Installation
Claude Code / Cursor / Codex
Manual Installation
- Download SKILL.md from GitHub
- Place it in
.claude/skills/ai-security-papers-guide/SKILL.mdinside your project - Restart your AI agent — it will auto-discover the skill
How ai-security-papers-guide Compares
| Feature / Agent | ai-security-papers-guide | Standard Approach |
|---|---|---|
| Platform Support | Not specified | Limited / Varies |
| Context Awareness | High | Baseline |
| Installation Complexity | Unknown | N/A |
Frequently Asked Questions
What does this skill do?
AI security papers from top-4 security conferences
Where can I find the source code?
You can find the source code on GitHub using the link provided at the top of the page.
SKILL.md Source
# AI Security Papers Guide (BIG4 Venues)
## Overview
A curated collection of AI security papers from the top-4 security conferences: IEEE S&P, ACM CCS, USENIX Security, and NDSS. Covers adversarial attacks, model stealing, data poisoning, privacy attacks, deepfake detection, and LLM security. Organized by year and venue, focusing exclusively on peer-reviewed work from these prestigious venues.
## Venues
| Venue | Full Name | Focus |
|-------|-----------|-------|
| **S&P** | IEEE Symposium on Security and Privacy | Broad security + privacy |
| **CCS** | ACM Conference on Computer and Communications Security | Systems security |
| **USENIX** | USENIX Security Symposium | Systems + network security |
| **NDSS** | Network and Distributed System Security | Network security |
## Topic Categories
```
AI Security (BIG4)
├── Adversarial ML
│ ├── Evasion attacks (adversarial examples)
│ ├── Poisoning attacks (backdoors, trojans)
│ ├── Model stealing (extraction, distillation)
│ └── Defenses (certified robustness, detection)
├── Privacy Attacks
│ ├── Membership inference
│ ├── Model inversion
│ ├── Attribute inference
│ └── Training data extraction
├── LLM Security
│ ├── Prompt injection
│ ├── Jailbreaking
│ ├── Data leakage
│ └── Alignment attacks
├── Deepfakes
│ ├── Generation methods
│ ├── Detection techniques
│ └── Watermarking
└── Federated Learning Security
├── Byzantine attacks
├── Gradient leakage
└── Secure aggregation
```
## Key Papers by Year
```python
# Recent highlights
papers_2024_2025 = [
{"title": "Not What You've Signed Up For: "
"Compromising Real-World LLM-Integrated Applications",
"venue": "S&P 2024", "topic": "LLM security"},
{"title": "Prompt Stealing Attacks Against "
"Text-to-Image Generation Models",
"venue": "S&P 2024", "topic": "Prompt extraction"},
{"title": "Backdoor Attacks on Language Models",
"venue": "CCS 2024", "topic": "NLP backdoors"},
{"title": "Membership Inference in LLMs",
"venue": "USENIX 2024", "topic": "Privacy"},
]
for p in papers_2024_2025:
print(f"[{p['venue']}] {p['title']}")
print(f" Topic: {p['topic']}")
```
## Research Trends
```markdown
### Emerging Areas (2024-2025)
1. **LLM security** — Jailbreaking, prompt injection, agent attacks
2. **Supply chain attacks** — Poisoned models, malicious packages
3. **Multi-modal attacks** — Cross-modal adversarial examples
4. **Agent security** — Attacks on LLM-based autonomous systems
5. **Watermarking** — LLM output detection, IP protection
6. **Unlearning** — Machine unlearning verification and attacks
```
## Use Cases
1. **Security research**: Find state-of-the-art attack/defense methods
2. **Threat modeling**: Understand AI system vulnerabilities
3. **Literature review**: Systematic coverage of BIG4 AI security
4. **Course material**: Graduate-level AI security curriculum
5. **Red teaming**: Learn evaluation techniques for AI systems
## References
- [Awesome-AI-Security-BIG4](https://github.com/Zhou-Zi7/Awesome-AI-Security-BIG4)
- [IEEE S&P](https://www.ieee-security.org/TC/SP-Index.html)
- [ACM CCS](https://www.sigsac.org/ccs/)Related Skills
thuthesis-guide
Write Tsinghua University theses using the ThuThesis LaTeX template
thesis-writing-guide
Templates, formatting rules, and strategies for thesis and dissertation writing
thesis-template-guide
Set up LaTeX templates for PhD and Master's thesis documents
sjtuthesis-guide
Write SJTU theses using the SJTUThesis LaTeX template with full compliance
novathesis-guide
LaTeX thesis template supporting multiple universities and formats
graphical-abstract-guide
Create SVG graphical abstracts for journal paper submissions
beamer-presentation-guide
Guide to creating academic presentations with LaTeX Beamer
plagiarism-detection-guide
Use plagiarism detection tools and ensure manuscript originality
paper-polish-guide
Review and polish LaTeX research papers for clarity and style
grammar-checker-guide
Use grammar and style checking tools to polish academic manuscripts
conciseness-editing-guide
Eliminate wordiness and redundancy in academic prose for clarity
academic-translation-guide
Academic translation, post-editing, and Chinglish correction guide