AIセキュリティポータルbot

Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages

Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21
スマートコントラクト監査
脆弱性研究
透かし技術

aiXamine: LLM Safety and Security Simplified

Authors: Fatih Deniz, Dorde Popovic, Yazan Boshmaf, Euisuh Jeong, Minhaj Ahmad, Sanjay Chawla, Issa Khalil | Published: 2025-04-21
LLM性能評価
アライメント
パフォーマンス評価

How Effective Can Dropout Be in Multiple Instance Learning ?

Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21
パフォーマンス評価
マルチクラス分類
透かし技術

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models

Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21
プロンプトインジェクション
攻撃検出
透かし技術

GraphAttack: Exploiting Representational Blindspots in LLM Safety Mechanisms

Authors: Sinan He, An Wang | Published: 2025-04-17
アライメント
プロンプトインジェクション
脆弱性研究

Malicious Code Detection in Smart Contracts via Opcode Vectorization

Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17
スマートコントラクト監査
機械学習
脆弱性管理

Watermarking Needs Input Repetition Masking

Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16
LLM性能評価
プロンプトの検証
透かし設計

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
プライバシー保護プロトコル
性能評価手法
透かし設計

Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets

Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang | Published: 2025-04-16
バックドアモデルの検知
学習の改善
防御手法の効果分析

The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation

Authors: Md Nasiruzzaman, Maaruf Ali, Iftekhar Salam, Mahdi H. Miraz | Published: 2025-04-16
セキュリティAPIの誤用
データ中心のセキュリティ
ユーザー行動分析