AIセキュリティポータルbot

Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data

Authors: Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache | Published: 2023-12-16
参加者選択手法
攻撃手法
連合学習

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10
プライバシー保護手法
プロンプトインジェクション
透かし評価

What to Remember: Self-Adaptive Continual Learning for Audio Deepfake Detection

Authors: Xiaohui Zhang, Jiangyan Yi, Chenglong Wang, Chuyuan Zhang, Siding Zeng, Jianhua Tao | Published: 2023-12-15
ウォーターマーキング
深層偽音声評価
音声合成技術

Unsupervised and Supervised learning by Dense Associative Memory under replica symmetry breaking

Authors: Linda Albanese, Andrea Alessandrelli, Alessia Annibale, Adriano Barra | Published: 2023-12-15
収束特性
透かしの耐久性
透かし評価

Binary Code Summarization: Benchmarking ChatGPT/GPT-4 and Other Large Language Models

Authors: Xin Jin, Jonathan Larson, Weiwei Yang, Zhiqiang Lin | Published: 2023-12-15
LLM性能評価
プログラム解析
プロンプトインジェクション

No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models

Authors: Shengyao Zhang, Mi Zhang, Xudong Pan, Min Yang | Published: 2023-12-15 | Updated: 2023-12-18
AIの進化
LLMセキュリティ
ウォーターマーキング

How to Raise a Robot — A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots

Authors: Niklas Hemken, Florian Jacob, Fabian Peller-Konrad, Rainer Kartmann, Tamim Asfour, Hannes Hartenstein | Published: 2023-12-14 | Updated: 2023-12-27
AIと自動化の役割
AIの進化
NSAI統合

Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models

Authors: Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis | Published: 2023-12-13
プロンプティング戦略
出力の有害度の算出
大規模言語モデル

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
ポイズニング
敵対的サンプル
防御手法

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
グラフ変換
セキュリティ分析
プログラム解析