AIセキュリティポータルbot

SALAD-Bench: A Hierarchical and Comprehensive Safety Benchmark for Large Language Models

Authors: Lijun Li, Bowen Dong, Ruohui Wang, Xuhao Hu, Wangmeng Zuo, Dahua Lin, Yu Qiao, Jing Shao | Published: 2024-02-07 | Updated: 2024-06-07
LLMセキュリティ
LLM性能評価
プロンプトインジェクション

Impact of Dataset Properties on Membership Inference Vulnerability of Deep Transfer Learning

Authors: Marlon Tobaben, Hibiki Ito, Joonas Jälkö, Yuan He, Antti Honkela | Published: 2024-02-07 | Updated: 2025-10-06
プライバシー保護機械学習
メンバーシップ推論
統計的検定

De-amplifying Bias from Differential Privacy in Language Model Fine-tuning

Authors: Sanjari Srivastava, Piotr Mardziel, Zhikhun Zhang, Archana Ahlawat, Anupam Datta, John C Mitchell | Published: 2024-02-07
データプライバシー評価
バイアス
プライバシー保護

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
モデル性能評価
深層学習手法
異常検出手法

LIPSTICK: Corruptibility-Aware and Explainable Graph Neural Network-based Oracle-Less Attack on Logic Locking

Authors: Yeganeh Aghamohammadi, Amin Rezaei | Published: 2024-02-06
GNN
モデルの解釈性
透かし評価

Measuring Implicit Bias in Explicitly Unbiased Large Language Models

Authors: Xuechunzi Bai, Angelina Wang, Ilia Sucholutsky, Thomas L. Griffiths | Published: 2024-02-06 | Updated: 2024-05-23
AIによる出力のバイアスの検出
アルゴリズムの公平性
大規模言語モデル

LLM Agents can Autonomously Hack Websites

Authors: Richard Fang, Rohan Bindu, Akul Gupta, Qiusi Zhan, Daniel Kang | Published: 2024-02-06 | Updated: 2024-02-16
ウェブサイト脆弱性
サイバー攻撃
プロンプトインジェクション

PAC-Bayesian Adversarially Robust Generalization Bounds for Graph Neural Network

Authors: Tan Sun, Junhong Lin | Published: 2024-02-06 | Updated: 2024-07-06
GNN
敵対的サンプル
透かし評価

Efficient Availability Attacks against Supervised and Contrastive Learning Simultaneously

Authors: Yihan Wang, Yifan Zhu, Xiao-Shan Gao | Published: 2024-02-06
サイバー攻撃
ポイズニング
敵対的訓練

A Survey of Privacy Threats and Defense in Vertical Federated Learning: From Model Life Cycle Perspective

Authors: Lei Yu, Meng Han, Yiming Li, Changting Lin, Yao Zhang, Mingyang Zhang, Yan Liu, Haiqin Weng, Yuseok Jeon, Ka-Ho Chow, Stacy Patterson | Published: 2024-02-06
プライバシー保護手法
ラベル推論攻撃
防御手法