AIセキュリティポータルbot

Indiscriminate Data Poisoning Attacks on Pre-trained Feature Extractors

Authors: Yiwei Lu, Matthew Y. R. Yang, Gautam Kamath, Yaoliang Yu | Published: 2024-02-20
バックドア攻撃
ポイズニング
転移学習

An Adversarial Approach to Evaluating the Robustness of Event Identification Models

Authors: Obai Bahwal, Oliver Kosut, Lalitha Sankar | Published: 2024-02-19 | Updated: 2024-04-22
イベント識別
ロバスト性評価

Robust CLIP: Unsupervised Adversarial Fine-Tuning of Vision Embeddings for Robust Large Vision-Language Models

Authors: Christian Schlarmann, Naman Deep Singh, Francesco Croce, Matthias Hein | Published: 2024-02-19 | Updated: 2024-06-05
プロンプトインジェクション
ロバスト性評価
敵対的訓練

CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation

Authors: Jueon Eom, Seyeon Jeong, Taekyoung Kwon | Published: 2024-02-19
ファジング
強化学習
評価手法

Defending Against Weight-Poisoning Backdoor Attacks for Parameter-Efficient Fine-Tuning

Authors: Shuai Zhao, Leilei Gan, Luu Anh Tuan, Jie Fu, Lingjuan Lyu, Meihuizi Jia, Jinming Wen | Published: 2024-02-19 | Updated: 2024-03-29
バックドアモデルの検知
攻撃手法
防御手法

Federated Bayesian Network Ensembles

Authors: Florian van Daalen, Lianne Ippel, Andre Dekker, Inigo Bermejo | Published: 2024-02-19
ベイズ分類
モデル設計
連合学習

Manipulating hidden-Markov-model inferences by corrupting batch data

Authors: William N. Caballero, Jose Manuel Camacho, Tahir Ekin, Roi Naveiro | Published: 2024-02-19
不確実性の定量化
攻撃の評価
攻撃手法

Stealing the Invisible: Unveiling Pre-Trained CNN Models through Adversarial Examples and Timing Side-Channels

Authors: Shubhi Shukla, Manaar Alam, Pabitra Mitra, Debdeep Mukhopadhyay | Published: 2024-02-19
モデル抽出攻撃
分類パターン分析
敵対的サンプル

An Empirical Evaluation of LLMs for Solving Offensive Security Challenges

Authors: Minghao Shao, Boyuan Chen, Sofija Jancheska, Brendan Dolan-Gavitt, Siddharth Garg, Ramesh Karri, Muhammad Shafique | Published: 2024-02-19
LLM性能評価
プロンプトインジェクション
教育目的のCTF

SPML: A DSL for Defending Language Models Against Prompt Attacks

Authors: Reshabh K Sharma, Vinayak Gupta, Dan Grossman | Published: 2024-02-19
LLMセキュリティ
システムプロンプト生成
プロンプトインジェクション