AIセキュリティポータルbot

Privacy-Aware In-Context Learning for Large Language Models

Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17
差分プライバシー
情報抽出
透かし

A Multi-Agent LLM Defense Pipeline Against Prompt Injection Attacks

Authors: S M Asif Hossain, Ruksat Khan Shayoni, Mohd Ruhul Ameen, Akif Islam, M. F. Mridha, Jungpil Shin | Published: 2025-09-16 | Updated: 2025-10-01
インダイレクトプロンプトインジェクション
プロンプトインジェクション
分散型LLMアーキテクチャ

Sy-FAR: Symmetry-based Fair Adversarial Robustness

Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16
公平性の確保
敵対的学習
評価指標

Jailbreaking Large Language Models Through Content Concretization

Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16
プロンプトインジェクション
モデル評価
評価指標

A Graph-Based Approach to Alert Contextualisation in Security Operations Centres

Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16
セキュリティ分析
攻撃シナリオ分析
機械学習手法

EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning

Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16
セキュアアグリゲーション
差分プライバシー
敵対的学習

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
アルゴリズム
安全性メカニズムの分析
透かし

A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs

Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16
コード生成手法
バックドアモデルの検知
脆弱性検出手法

Yet Another Watermark for Large Language Models

Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16
プロンプトリーキング
大規模言語モデル
透かし技術

Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study

Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15
モデル抽出攻撃
攻撃の分類
脆弱性検出手法