AIセキュリティポータルbot

LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks

Authors: Ruoxi Wang, Kun Li, Minghui Xu, Yue Zhang, Kaidi Xu, Chunchi Liu, Yinhao Xiao, Xiuzhen Cheng | Published: 2025-07-07
バイナリ解析
Factors of Performance Degradation
Watermark Design

FIDESlib: A Fully-Fledged Open-Source FHE Library for Efficient CKKS on GPUs

Authors: Carlos Agulló-Domingo, Óscar Vera-López, Seyda Guzelhan, Lohit Daksha, Aymane El Jerari, Kaustubh Shivdikar, Rashmi Agrawal, David Kaeli, Ajay Joshi, José L. Abellán | Published: 2025-07-07
Memory Evaluation
Factors of Performance Degradation
Watermark Design

Efficient Unlearning with Privacy Guarantees

Authors: Josep Domingo-Ferrer, Najeeb Jebreel, David Sánchez | Published: 2025-07-07
Privacy Violation
Machine learning
Differential Privacy

Large Language Models for Network Intrusion Detection Systems: Foundations, Implementations, and Future Directions

Authors: Shuo Yang, Xinran Zheng, Xinchen Zhang, Jinfeng Xu, Jinze Li, Donglin Xie, Weicai Long, Edith C. H. Ngai | Published: 2025-07-07
Indirect Prompt Injection
Prompt Injection
Role of Artificial Intelligence

Visual Contextual Attack: Jailbreaking MLLMs with Image-Driven Context Injection

Authors: Ziqi Miao, Yi Ding, Lijun Li, Jing Shao | Published: 2025-07-03
Prompt Injection
Model DoS
Adversarial Attack Methods

Early Signs of Steganographic Capabilities in Frontier LLMs

Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03
料理手順
Watermark Evaluation
隠れタスク評価

CyberRAG: An agentic RAG cyber attack classification and reporting tool

Authors: Francesco Blefari, Cristian Cosentino, Francesco Aurelio Pironti, Angelo Furfaro, Fabrizio Marozzo | Published: 2025-07-03
Poisoning attack on RAG
Vulnerability Analysis
Interpretability

Evaluating Language Models For Threat Detection in IoT Security Logs

Authors: Jorge J. Tejero-Fernández, Alfonso Sánchez-Macián | Published: 2025-07-03
IoT Traffic Analysis
Model DoS
Vulnerability Analysis

EIM-TRNG: Obfuscating Deep Neural Network Weights with Encoding-in-Memory True Random Number Generator via RowHammer

Authors: Ranyang Zhou, Abeer Matar A. Almalky, Gamana Aragonda, Sabbir Ahmed, Filip Roth Trønnes-Christensen, Adnan Siraj Rakin, Shaahin Angizi | Published: 2025-07-03
DRAMベースのTRNG
Trigger Detection
Hardware Design

Empowering Manufacturers with Privacy-Preserving AI Tools: A Case Study in Privacy-Preserving Machine Learning to Solve Real-World Problems

Authors: Xiaoyu Ji, Jessica Shorland, Joshua Shank, Pascal Delpe-Brice, Latanya Sweeney, Jan Allebach, Ali Shakouri | Published: 2025-07-02
Medical Image Analysis
画像処理手法
製品安全性