AIセキュリティポータルbot

Label-Only Model Inversion Attacks via Knowledge Transfer

Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30
プライバシー手法
攻撃の評価
深層学習手法

Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data

Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30
データ生成
プライバシー手法
実験的検証

From Chatbots to PhishBots? — Preventing Phishing scams created using ChatGPT, Google Bard and Claude

Authors: Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh | Published: 2023-10-29 | Updated: 2024-03-10
データセット生成
フィッシング攻撃の検出率
プロンプトインジェクション

Poisoning Retrieval Corpora by Injecting Adversarial Passages

Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29
RAGへのポイズニング攻撃
ポイズニング
敵対的サンプル

Label Poisoning is All You Need

Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29
セキュリティ分析
バックドア攻撃
悪意のある行為者の分類

Temperature Monitoring of Agricultural Areas in a Secure Data Room

Authors: Thomas Ederer, Martin Ivancsits, Igor Ivkić | Published: 2023-10-27
市民科学
気候データ収集
気候情報

PubDef: Defending Against Transfer Attacks From Public Models

Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17
敵対的攻撃
敵対的訓練
防御手法

Instability of computer vision models is a necessary result of the task itself

Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26
ロバスト性に関する評価
敵対的サンプル
次元削減手法

A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26
セキュリティ分析
モデル設計
敵対的攻撃検出

Privately Aligning Language Models with Reinforcement Learning

Authors: Fan Wu, Huseyin A. Inan, Arturs Backurs, Varun Chandrasekaran, Janardhan Kulkarni, Robert Sim | Published: 2023-10-25 | Updated: 2024-05-03
プライバシー手法
モデル設計
自然言語処理