AIセキュリティポータルbot

Generative AI-Based Effective Malware Detection for Embedded Computing Systems

Authors: Sreenitha Kasarapu, Sanket Shukla, Rakibul Hassan, Avesta Sasan, Houman Homayoun, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-02 | Updated: 2024-04-12
Dataset Generation
Malware Classification
Malware Detection with Limited Samples

Jailbreaking Leading Safety-Aligned LLMs with Simple Adaptive Attacks

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion | Published: 2024-04-02 | Updated: 2024-10-07
LLM Security
Prompt Injection
Attack Method

Digital Forgetting in Large Language Models: A Survey of Unlearning Methods

Authors: Alberto Blanco-Justicia, Najeeb Jebreel, Benet Manzanares, David Sánchez, Josep Domingo-Ferrer, Guillem Collell, Kuan Eeik Tan | Published: 2024-04-02
LLM Performance Evaluation
Prompt Injection
Machine Unlearning

Humanizing Machine-Generated Content: Evading AI-Text Detection through Adversarial Attack

Authors: Ying Zhou, Ben He, Le Sun | Published: 2024-04-02
LLM Security
Watermarking
Attack Method

AAA: an Adaptive Mechanism for Locally Differential Private Mean Estimation

Authors: Fei Wei, Ergute Bao, Xiaokui Xiao, Yin Yang, Bolin Ding | Published: 2024-04-02 | Updated: 2024-04-03
Watermarking
Privacy Protection Method
Optimization Problem

Can Biases in ImageNet Models Explain Generalization?

Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01
Bias
Model Performance Evaluation
Watermark Evaluation

Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01
Backdoor Attack
Poisoning
Membership Inference

Machine Unlearning for Traditional Models and Large Language Models: A Short Survey

Authors: Yi Xu | Published: 2024-04-01
Data Privacy Assessment
Model Performance Evaluation
Machine Unlearning

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement

Authors: Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan | Published: 2024-04-01
LLM Performance Evaluation
Model Performance Evaluation
Log Analysis Method

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01
Online Learning
Intrusion Detection System
Anomaly Detection Method