AIセキュリティポータルbot

Uncertainty-Driven Reliability: Selective Prediction and Trustworthy Deployment in Modern Machine Learning

Authors: Stephan Rabanser | Published: 2025-08-11
データキュレーション
差分プライバシー
選択的予測におけるリスクとカバレッジのトレードオフ

ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts

Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12
フレームワーク
プロアクティブ防御

DSperse: A Framework for Targeted Verification in Zero-Knowledge Machine Learning

Authors: Dan Ivanov, Tristan Freiberg, Shirin Shahabi, Jonathan Gold, Haruna Isah | Published: 2025-08-09 | Updated: 2025-09-18
モデル設計
機械学習フレームワーク
評価手法

Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification

Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07
バックドア攻撃
バックドア攻撃手法
ポイズニング

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07
IoTネットワーク攻撃
性能評価手法
透かし設計

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07
RAG
性能評価手法
深層学習

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07
RAGへのポイズニング攻撃
強化学習
性能評価手法

JPS: Jailbreak Multimodal Large Language Models with Collaborative Visual Perturbation and Textual Steering

Authors: Renmiao Chen, Shiyao Cui, Xuancheng Huang, Chengwei Pan, Victor Shea-Jay Huang, QingLin Zhang, Xuan Ouyang, Zhexin Zhang, Hongning Wang, Minlie Huang | Published: 2025-08-07
プロンプトインジェクション
不適切コンテンツ生成
攻撃戦略分析

Measuring the Carbon Footprint of Cryptographic Privacy-Enhancing Technologies

Authors: Marc Damie, Mihai Pop, Merijn Posthuma | Published: 2025-08-06
カーボンフットプリント分析
環境影響評価
通信セキュリティ

Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation

Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06
ロバスト最適化
性能評価手法
深層学習