AIセキュリティポータルbot

A Cross-Language Investigation into Jailbreak Attacks in Large Language Models

Authors: Jie Li, Yi Liu, Chongyang Liu, Ling Shi, Xiaoning Ren, Yaowen Zheng, Yang Liu, Yinxing Xue | Published: 2024-01-30
キャラクター役割演技
プロンプトインジェクション
多言語LLMジャイルブレイク

Data-Oblivious ML Accelerators using Hardware Security Extensions

Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29
FPGA
ウォーターマーキング
データ保護手法

LLM4Vuln: A Unified Evaluation Framework for Decoupling and Enhancing LLMs’ Vulnerability Reasoning

Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Wei Ma, Lyuye Zhang, Yang Liu, Yingjiu Li | Published: 2024-01-29 | Updated: 2025-01-13
LLM性能評価
プロンプトインジェクション
脆弱性管理

Federated unsupervised random forest for privacy-preserving patient stratification

Authors: Bastian Pfeifer, Christel Sirocchi, Marcus D. Bloice, Markus Kreuzthaler, Martin Urschler | Published: 2024-01-29
クラスタリング手法
ランダムフォレスト
連合学習

Blockchain-enabled Trustworthy Federated Unlearning

Authors: Yijing Lin, Zhipeng Gao, Hongyang Du, Jinke Ren, Zhiqiang Xie, Dusit Niyato | Published: 2024-01-29
ウォーターマーキング
連合学習
適応型再訓練メカニズム

Integrating Differential Privacy and Contextual Integrity

Authors: Sebastian Benthall, Rachel Cummings | Published: 2024-01-28
CIとDPの統合
プライバシー保護
プライバシー保護手法

L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks

Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22
アルゴリズム
ウォーターマーキング
サイバー攻撃

Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach

Authors: Zhaoyang Qu, Yunchang Dong, Yang Li, Siqi Song, Tao Jiang, Min Li, Qiming Wang, Lei Wang, Xiaoyong Bo, Jiye Zang, Qi Xu | Published: 2024-01-27
DDIA
DDIAの検出と位置特定
モデル性能評価

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
サイバーセキュリティ
ランサムウェア評価
機械学習手法

Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation

Authors: Yiling Xie, Xiaoming Huo | Published: 2024-01-27
ウォーターマーキング
敵対的訓練
適応型敵対的訓練