AIセキュリティポータルbot

Unveiling the Resilience of LLM-Enhanced Search Engines against Black-Hat SEO Manipulation

Authors: Pei Chen, Geng Hong, Xinyi Wu, Mengying Wu, Zixuan Zhu, Mingxuan Liu, Baojun Liu, Mi Zhang, Min Yang | Published: 2026-03-26
Prompt leaking
Model Extraction Attack
Large Language Model

Beyond Content Safety: Real-Time Monitoring for Reasoning Vulnerabilities in Large Language Models

Authors: Xunguang Wang, Yuguang Zhou, Qingyue Wang, Zongjie Li, Ruixuan Huang, Zhenlan Ji, Pingchuan Ma, Shuai Wang | Published: 2026-03-26
Indirect Prompt Injection
Prompt leaking
Large Language Model

ALPS: Automated Least-Privilege Enforcement for Securing Serverless Functions

Authors: Changhee Shin, Bom Kim, Seungsoo Lee | Published: 2026-03-26
セキュリティアライメント
Data Extraction and Analysis
動的ポリシー適応

On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
データ毒性
Backdoor Attack
Attackers and Malicious Devices

Physical Backdoor Attack Against Deep Learning-Based Modulation Classification

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
データ毒性
Backdoor Detection
Backdoor Attack

Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening

Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26
Proactive Defense
Attackers and Malicious Devices
評価メトリクス

Attack Assessment and Augmented Identity Recognition for Human Skeleton Data

Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25
Data Generation
Robustness Improvement Method
Adversarial Learning

Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search

Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25
Phishing Attack
Prompt Injection
Attackers and Malicious Devices

Walma: Learning to See Memory Corruption in WebAssembly

Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25
Data Generation
脆弱性検出手法
評価基準

Toward a Multi-Layer ML-Based Security Framework for Industrial IoT

Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25
IoT Security Framework
Attackers and Malicious Devices
評価基準