AIセキュリティポータルbot

Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation

Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22
データの起源と変遷
パスワードセキュリティ
機械学習

ReCopilot: Reverse Engineering Copilot in Binary Analysis

Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22
アライメント
バイナリ分析
動的分析

SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models

Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22
敵対的学習
計算複雑性
防御メカニズム

Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models

Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22
モデルインバージョン
異常検知アルゴリズム
解釈可能性の損失

Verifying Differentially Private Median Estimation

Authors: Hyukjun Kwon, Chenglin Fan | Published: 2025-05-22
プライバシー評価
効率的証明システム
差分プライバシー

A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles

Authors: Md Ashraf Uddin, Nam H. Chu, Reza Rafeh, Mutaz Barika | Published: 2025-05-22
攻撃タイプ
連合学習
階層型分類モデル

Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval

Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21
RAG
大規模言語モデル
防御メカニズム

Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses

Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21
アライメント
プロンプトインジェクション
防御メカニズム

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries

Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21
RAG
RAGへのポイズニング攻撃
プライバシー損失分析

Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs

Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21
テキスト生成手法
プロンプトリーキング
視覚化の脆弱性