AIセキュリティポータルbot

Privacy preserving layer partitioning for Deep Neural Network models

Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Privacy Protection Method
Computational Efficiency

Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs

Authors: Bibek Upadhayay, Vahid Behzadan | Published: 2024-04-09
LLM Security
Prompt Injection
Attack Method

Rethinking How to Evaluate Language Model Jailbreak

Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik | Published: 2024-04-09 | Updated: 2024-05-07
Prompt Injection
Classification of Malicious Actors
Evaluation Method

Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning

Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09
Poisoning
Attack Method
Defense Method

FuSeBMC AI: Acceleration of Hybrid Approach through Machine Learning

Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Chenfeng Wei, Tom Sweet, Richard Allmendinger, Lucas C. Cordeiro | Published: 2024-04-09
Test Prioritization
Program Analysis
Resource optimization

Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets

Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08
Watermarking
Malware Classification
Evaluation Method

BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack

Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01
Watermarking
Attack Method
Adversarial Example

Unbridled Icarus: A Survey of the Potential Perils of Image Inputs in Multimodal Large Language Model Security

Authors: Yihe Fan, Yuxin Cao, Ziyu Zhao, Ziyao Liu, Shaofeng Li | Published: 2024-04-08 | Updated: 2024-08-11
LLM Security
Prompt Injection
Threat modeling

Enabling Privacy-Preserving Cyber Threat Detection with Federated Learning

Authors: Yu Bi, Yekai Li, Xuan Feng, Xianghang Mi | Published: 2024-04-08
Spam Detection
Poisoning
Federated Learning

Initial Exploration of Zero-Shot Privacy Utility Tradeoffs in Tabular Data Using GPT-4

Authors: Bishwas Mandal, George Amariucai, Shuangqing Wei | Published: 2024-04-07
Data Privacy Assessment
Privacy Protection Method
Prompt Injection