AIセキュリティポータルbot

Using Hallucinations to Bypass GPT4’s Filter

Authors: Benjamin Lemkin | Published: 2024-02-16 | Updated: 2024-03-11
LLM Security
Prompt Injection
Inappropriate Content Generation

On the Impact of Uncertainty and Calibration on Likelihood-Ratio Membership Inference Attacks

Authors: Meiyi Zhu, Caili Guo, Chunyan Feng, Osvaldo Simeone | Published: 2024-02-16 | Updated: 2025-05-13
Membership Inference
Quantification of Uncertainty
Computational Complexity

Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy

Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16
Privacy Protection Method
Fairness evaluation
Information Hiding Techniques

Measuring and Reducing LLM Hallucination without Gold-Standard Answers

Authors: Jiaheng Wei, Yuanshun Yao, Jean-Francois Ton, Hongyi Guo, Andrew Estornell, Yang Liu | Published: 2024-02-16 | Updated: 2024-06-06
Few-Shot Learning
Detection of Hallucinations
Watermark Evaluation

A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets

Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15
Privacy Protection Method
Cryptography
Federated Learning

FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning

Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15
Poisoning
Attack Method
Federated Learning

How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage

Authors: Achraf Azize, Debabrota Basu | Published: 2024-02-15
Membership Inference
Hypothesis Testing
Watermark Evaluation

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15
Dataset Generation
Intrusion Detection System
Attack Evaluation

Utilizing Deep Learning for Enhancing Network Resilience in Finance

Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18
Network Threat Detection
Intrusion Detection System
Deep Learning Method

An advanced data fabric architecture leveraging homomorphic encryption and federated learning

Authors: Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino | Published: 2024-02-15
Privacy Protection
Medical Image Analysis
Federated Learning