AIセキュリティポータルbot

On Trojan Signatures in Large Language Models of Code

Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07
LLMセキュリティ
トロイの木馬の署名
トロイの木馬検出

Verifiable Boosted Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22
モデル性能評価
ロバスト性評価
最適化問題

BIONIB: Blockchain-based IoT using Novelty Index in Bridge Health Monitoring

Authors: Divija Swetha Gadiraju, Ryan McMaster, Saeed Eftekhar Azam, Deepak Khazanchi | Published: 2024-02-22
スケーラビリティ分析
ブロックチェーン技術
橋梁モニタリング

Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs

Authors: Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann | Published: 2024-02-22
データプライバシー評価
データ前処理
連合学習

Closed-Form Bounds for DP-SGD against Record-level Inference

Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin | Published: 2024-02-22
プライバシー保護手法
ベイズセキュリティ
メンバーシップ推論

Coercing LLMs to do and reveal (almost) anything

Authors: Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein | Published: 2024-02-21
LLMセキュリティ
プロンプトインジェクション
攻撃手法

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Authors: Mohammad Amaz Uddin, Iqbal H. Sarker | Published: 2024-02-21
フィッシング検出
モデルの解釈性
モデル性能評価

Learning to Poison Large Language Models for Downstream Manipulation

Authors: Xiangyu Zhou, Yao Qiang, Saleh Zare Zade, Mohammad Amin Roshani, Prashant Khanduri, Douglas Zytko, Dongxiao Zhu | Published: 2024-02-21 | Updated: 2025-05-29
LLMセキュリティ
バックドア攻撃
ポイズニング攻撃

A Comprehensive Study of Jailbreak Attack versus Defense for Large Language Models

Authors: Zihao Xu, Yi Liu, Gelei Deng, Yuekang Li, Stjepan Picek | Published: 2024-02-21 | Updated: 2024-05-17
LLMセキュリティ
プロンプトインジェクション
防御手法

The Wolf Within: Covert Injection of Malice into MLLM Societies via an MLLM Operative

Authors: Zhen Tan, Chengshuai Zhao, Raha Moraffah, Yifan Li, Yu Kong, Tianlong Chen, Huan Liu | Published: 2024-02-20 | Updated: 2024-06-03
LLMセキュリティ
悪意のある行為者の分類
攻撃手法