AIセキュリティポータルbot

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach

Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02
プライバシー保護手法
ポイズニング
連合学習

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li | Published: 2024-03-02
LLMセキュリティ
プロンプトインジェクション
攻撃手法

BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs)

Authors: Sean Wellington | Published: 2024-03-01
プライバシー保護
リソース最適化
分散型LLMアーキテクチャ

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01
セキュリティ分析
ポイズニング
転移学習

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05
データ生成
プライバシー保護手法
モデル性能評価

Attacking Delay-based PUFs with Minimal Adversary Model

Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01
PUFの評価手法
モデル性能評価
攻撃手法

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01
サイバーセキュリティ
戦略的洞察の向上
脆弱性管理

Teach LLMs to Phish: Stealing Private Information from Language Models

Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01
バックドア攻撃
フィッシング検出
プロンプトインジェクション

Shifted Interpolation for Differential Privacy

Authors: Jinho Bok, Weijie Su, Jason M. Altschuler | Published: 2024-03-01 | Updated: 2024-06-12
プライバシー保護手法
収束保証
損失関数

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng | Published: 2024-03-01
多者計算
計算効率
通信効率