AIセキュリティポータルbot

Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics

Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11
LLM Performance Evaluation
Model Performance Evaluation
Watermark Evaluation

Defending Against Indirect Prompt Injection Attacks With Spotlighting

Authors: Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman | Published: 2024-03-20
Indirect Prompt Injection
Prompt Injection
Malicious Prompt

Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07
Attack Method
Adversarial Example
Defense Method

ADAPT to Robustify Prompt Tuning Vision Transformers

Authors: Masih Eskandar, Tooba Imtiaz, Zifeng Wang, Jennifer Dy | Published: 2024-03-19 | Updated: 2025-02-07
Prompting Strategy
Prompt Engineering
Adversarial Training

Resilience in Online Federated Learning: Mitigating Model-Poisoning Attacks via Partial Sharing

Authors: Ehsan Lari, Reza Arablouei, Vinay Chakravarthi Gogineni, Stefan Werner | Published: 2024-03-19 | Updated: 2024-08-16
Poisoning
Communication Efficiency
Federated Learning

Towards Better Statistical Understanding of Watermarking LLMs

Authors: Zhongze Cai, Shang Liu, Hanzhao Wang, Huaiyang Zhong, Xiaocheng Li | Published: 2024-03-19
Watermarking
Optimization Problem
Watermark Robustness

FedFisher: Leveraging Fisher Information for One-Shot Federated Learning

Authors: Divyansh Jhunjhunwala, Shiqiang Wang, Gauri Joshi | Published: 2024-03-19
Convergence Guarantee
Communication Efficiency
Federated Learning

Large language models in 6G security: challenges and opportunities

Authors: Tri Nguyen, Huong Nguyen, Ahmad Ijaz, Saeid Sheikhi, Athanasios V. Vasilakos, Panos Kostakos | Published: 2024-03-18
LLM Security
Cybersecurity
Decentralized LLM Architecture

Thwarting Cybersecurity Attacks with Explainable Concept Drift

Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18
Cybersecurity
Model Performance Evaluation
Concept Drift

Leveraging Large Language Models to Detect npm Malicious Packages

Authors: Nusrat Zahan, Philipp Burckhardt, Mikola Lysenko, Feross Aboukhadijeh, Laurie Williams | Published: 2024-03-18 | Updated: 2025-01-06
LLM Performance Evaluation
Prompt Injection
Malware Classification