AIセキュリティポータルbot

Not All Samples Are Equal: Quantifying Instance-level Difficulty in Targeted Data Poisoning

Authors: William Xu, Yiwei Lu, Yihan Wang, Matthew Y. R. Yang, Zuoqiu Liu, Gautam Kamath, Yaoliang Yu | Published: 2025-09-08
ポイズニング
ポイズニング難易度
攻撃手法

EPT Benchmark: Evaluation of Persian Trustworthiness in Large Language Models

Authors: Mohammad Reza Mirbagheri, Mohammad Mahdi Mirkamali, Zahra Motoshaker Arani, Ali Javeri, Amir Mahdi Sadeghzadeh, Rasool Jalili | Published: 2025-09-08
フェアネス学習
プロンプトの検証
安全性

Imitative Membership Inference Attack

Authors: Yuntao Du, Yuetian Chen, Hanshen Xiao, Bruno Ribeiro, Ninghui Li | Published: 2025-09-08
実験的検証
攻撃手法
敵対的学習

When Secure Isn’t: Assessing the Security of Machine Learning Model Sharing

Authors: Gabriele Digregorio, Marco Di Gennaro, Stefano Zanero, Stefano Longari, Michele Carminati | Published: 2025-09-08
ソフトウェアセキュリティ
モデル抽出攻撃
モデル抽出攻撃の検知

LLMs in Cybersecurity: Friend or Foe in the Human Decision Loop?

Authors: Irdin Pekaric, Philipp Zech, Tom Mattson | Published: 2025-09-08
人間とAIの協力
実験設定
専門家の意見収集

Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem

Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08
データ漏洩
プライバシー管理
脆弱性管理

Contrastive Self-Supervised Network Intrusion Detection using Augmented Negative Pairs

Authors: Jack Wilkie, Hanan Hindy, Christos Tachtatzis, Robert Atkinson | Published: 2025-09-08
MLベースのIDS
異常検知
自己教師あり学習

Mask-GCG: Are All Tokens in Adversarial Suffixes Necessary for Jailbreak Attacks?

Authors: Junjie Mu, Zonghao Ying, Zhekui Fan, Zonglei Jing, Yaoyuan Zhang, Zhengmin Yu, Wenxin Zhang, Quanchen Zou, Xiangzheng Zhang | Published: 2025-09-08
トークンの処理と収集
プルーニング手法
プロンプトインジェクション

Embedding Poisoning: Bypassing Safety Alignment via Embedding Semantic Shift

Authors: Shuai Yuan, Zhibo Zhang, Yuxi Li, Guangdong Bai, Wang Kailong | Published: 2025-09-08
LLMの安全機構の解除
出力の有害度の算出
攻撃検出手法

AttestLLM: Efficient Attestation Framework for Billion-scale On-device LLMs

Authors: Ruisi Zhang, Yifei Zhao, Neusha Javidnia, Mengxin Zheng, Farinaz Koushanfar | Published: 2025-09-08
セキュリティ戦略生成
効率評価
大規模言語モデル