AIセキュリティポータルbot

Detecting Adversarial Spectrum Attacks via Distance to Decision Boundary Statistics

Authors: Wenwei Zhao, Xiaowen Li, Shangqing Zhao, Jie Xu, Yao Liu, Zhuo Lu | Published: 2024-02-14
敵対的サンプル
敵対的スペクトル攻撃検出
敵対的攻撃検出

Test-Time Backdoor Attacks on Multimodal Large Language Models

Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13
バックドア攻撃
モデル性能評価
攻撃手法

Agent Smith: A Single Image Can Jailbreak One Million Multimodal LLM Agents Exponentially Fast

Authors: Xiangming Gu, Xiaosen Zheng, Tianyu Pang, Chao Du, Qian Liu, Ye Wang, Jing Jiang, Min Lin | Published: 2024-02-13 | Updated: 2024-06-03
LLMセキュリティ
プロンプトインジェクション
敵対的攻撃検出

ROSpace: Intrusion Detection Dataset for a ROS2-Based Cyber-Physical System

Authors: Tommaso Puccetti, Simone Nardi, Cosimo Cinquilli, Tommaso Zoppi, Andrea Ceccarelli | Published: 2024-02-13
サイバーセキュリティ
データ収集
侵入検知システム

Pandora: Jailbreak GPTs by Retrieval Augmented Generation Poisoning

Authors: Gelei Deng, Yi Liu, Kailong Wang, Yuekang Li, Tianwei Zhang, Yang Liu | Published: 2024-02-13
LLMセキュリティ
プロンプトインジェクション
悪意のあるコンテンツ生成

Data Reconstruction Attacks and Defenses: A Systematic Evaluation

Authors: Sheng Liu, Zihan Wang, Yuxiao Chen, Qi Lei | Published: 2024-02-13 | Updated: 2025-03-22
プライバシー分析
モデルの堅牢性
敵対的攻撃

CycPUF: Cyclic Physical Unclonable Function

Authors: Michael Dominguez, Amin Rezaei | Published: 2024-02-12
FPGA
PUFの評価手法
透かし評価

Locality Sensitive Hashing for Network Traffic Fingerprinting

Authors: Nowfel Mashnoor, Jay Thom, Abdur Rouf, Shamik Sengupta, Batyr Charyyev | Published: 2024-02-12
IoTデバイス識別
パラメータ調整
フィンガープリンティング手法

Dumviri: Detecting Trackers and Mixed Trackers with a Breakage Detector

Authors: He Shuang, Lianying Zhao, David Lie | Published: 2024-02-12 | Updated: 2024-09-12
トラッキングの検出

PoisonedRAG: Knowledge Corruption Attacks to Retrieval-Augmented Generation of Large Language Models

Authors: Wei Zou, Runpeng Geng, Binghui Wang, Jinyuan Jia | Published: 2024-02-12 | Updated: 2024-08-13
プロンプトインジェクション
ポイズニング
ポイズニング攻撃