AIセキュリティポータルbot

Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models via Watermarking

Authors: Yijie Xu, Aiwei Liu, Xuming Hu, Lijie Wen, Hui Xiong | Published: 2025-03-06 | Updated: 2025-03-15
生成AI向け電子透かし
生成モデル
透かし除去技術

Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset

Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16
サイバーセキュリティ
パフォーマンス評価
評価指標

UniNet: A Unified Multi-granular Traffic Modeling Framework for Network Security

Authors: Binghui Wu, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2025-03-06 | Updated: 2025-07-03
IoTトラフィック分析
ネットワークトラフィックの変更
透かし評価

Slow is Fast! Dissecting Ethereum’s Slow Liquidity Drain Scams

Authors: Minh Trung Tran, Nasrin Sohrabi, Zahir Tari, Qin Wang, Minhui Xue, Xiaoyu Xia | Published: 2025-03-06 | Updated: 2025-08-06
不正取引
詐欺手法
金融インテリジェンス

Improving LLM Safety Alignment with Dual-Objective Optimization

Authors: Xuandong Zhao, Will Cai, Tianneng Shi, David Huang, Licong Lin, Song Mei, Dawn Song | Published: 2025-03-05 | Updated: 2025-06-12
プロンプトインジェクション
ロバスト性向上手法
安全性と有用性のトレードオフ

Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories

Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18
インダイレクトプロンプトインジェクション
深層学習
脆弱性検出

SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models

Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07
プライバシー保護
モデル性能評価
差分プライバシー

PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Hybrid Secret Sharing

Authors: Zhichao You, Xuewen Dong, Ke Cheng, Xutong Mu, Jiaxuan Fu, Shiyang Ma, Qiang Qu, Yulong Shen | Published: 2025-03-05 | Updated: 2025-05-14
AIによる出力のバイアスの検出
プライバシー設計原則
暗号技術

SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs

Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28
RAG
出力の有害度の算出
攻撃検出

Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection

Authors: Ragini Gupta, Shinan Liu, Ruixiao Zhang, Xinyue Hu, Xiaoyang Wang, Hadjer Benkraouda, Pranav Kommaraju, Nick Feamster, Klara Nahrstedt | Published: 2025-03-04 | Updated: 2025-08-13
アクティブラーニング
クラス不均衡
データ拡張手法