AIセキュリティポータルbot

BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs)

Authors: Sean Wellington | Published: 2024-03-01
Privacy Protection
Resource optimization
Decentralized LLM Architecture

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01
Security Analysis
Poisoning
Transfer Learning

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05
Data Generation
Privacy Protection Method
Model Performance Evaluation

Attacking Delay-based PUFs with Minimal Adversary Model

Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01
Evaluation Methods for PUF
Model Performance Evaluation
Attack Method

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01
Cybersecurity
Enhancement of Strategic Insights
Vulnerability Management

Teach LLMs to Phish: Stealing Private Information from Language Models

Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01
Backdoor Attack
Phishing Detection
Prompt Injection

Shifted Interpolation for Differential Privacy

Authors: Jinho Bok, Weijie Su, Jason M. Altschuler | Published: 2024-03-01 | Updated: 2024-06-12
Privacy Protection Method
Convergence Guarantee
Loss Function

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng | Published: 2024-03-01
Multi-Party Computation
Computational Efficiency
Communication Efficiency

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24
Model Extraction Attack
Large Language Model
Taxonomy of Attacks

PRSA: PRompt Stealing Attacks against Large Language Models

Authors: Yong Yang, Changjiang Li, Yi Jiang, Xi Chen, Haoyu Wang, Xuhong Zhang, Zonghui Wang, Shouling Ji | Published: 2024-02-29 | Updated: 2024-06-08
LLM Performance Evaluation
Prompt Injection
Prompt Engineering