AIセキュリティポータルbot

Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning

Authors: Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Fengjun Pan, Jinming Wen | Published: 2024-01-11 | Updated: 2024-10-09
バックドア攻撃
プロンプトインジェクション

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning

Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11
ウォーターマーキング
セキュリティ分析
透かし評価

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11
GNN
侵入検知システム
異常検出手法

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization

Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11
ウォーターマーキング
メモリ管理手法
モデル性能評価

A provable initialization and robust clustering method for general mixture models

Authors: Soham Jana, Jianqing Fan, Sanjeev Kulkarni | Published: 2024-01-10 | Updated: 2024-10-23
クラスタリング手法
ロバスト性評価
敵対的攻撃

Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training

Authors: Evan Hubinger, Carson Denison, Jesse Mu, Mike Lambert, Meg Tong, Monte MacDiarmid, Tamera Lanham, Daniel M. Ziegler, Tim Maxwell, Newton Cheng, Adam Jermyn, Amanda Askell, Ansh Radhakrishnan, Cem Anil, David Duvenaud, Deep Ganguli, Fazl Barez, Jack Clark, Kamal Ndousse, Kshitij Sachan, Michael Sellitto, Mrinank Sharma, Nova DasSarma, Roger Grosse, Shauna Kravec, Yuntao Bai, Zachary Witten, Marina Favaro, Jan Brauner, Holden Karnofsky, Paul Christiano, Samuel R. Bowman, Logan Graham, Jared Kaplan, Sören Mindermann, Ryan Greenblatt, Buck Shlegeris, Nicholas Schiefer, Ethan Perez | Published: 2024-01-10 | Updated: 2024-01-17
バックドア攻撃
プロンプトインジェクション
強化学習

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran | Published: 2024-01-10
ビザンチン耐性
ポイズニング
連合学習

Optimized Ensemble Model Towards Secured Industrial IoT Devices

Authors: MohammadNoor Injadat | Published: 2024-01-10
モデル性能評価
侵入検知システム
最適化手法

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
ネットワーク脅威検出
モデル抽出攻撃
性能評価手法

Local Privacy-preserving Mechanisms and Applications in Machine Learning

Authors: Likun Qin, Tianshuo Qiu | Published: 2024-01-08
データプライバシー評価
プライバシー保護
連合学習