AIセキュリティポータルbot

ACW: Enhancing Traceability of AI-Generated Codes Based on Watermarking

Authors: Boquan Li, Mengdi Zhang, Peixin Zhang, Jun Sun, Xingmei Wang, Zirui Fu | Published: 2024-02-12 | Updated: 2024-08-21
Algorithm
Watermarking
Watermark Evaluation

Secret Collusion among Generative AI Agents: Multi-Agent Deception via Steganography

Authors: Sumeet Ramesh Motwani, Mikhail Baranchuk, Martin Strohmeier, Vijay Bolina, Philip H. S. Torr, Lewis Hammond, Christian Schroeder de Witt | Published: 2024-02-12 | Updated: 2025-04-14
Privacy Enhancing Technology
Prompt leaking
Digital Watermarking for Generative AI

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples

Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05
Algorithm
Algorithm Design
Dataset Generation

Enhancing Multi-Criteria Decision Analysis with AI: Integrating Analytic Hierarchy Process and GPT-4 for Automated Decision Support

Authors: Igor Svoboda, Dmytro Lande | Published: 2024-02-12
Evolution of AI
Expert Opinion Collection
Expert Opinion Collection Process

Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code

Authors: Liming Jiang | Published: 2024-02-12
LLM Security
Data Privacy Assessment
Privacy Protection

Differentially Private Training of Mixture of Experts Models

Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11
LLM Performance Evaluation
Privacy Protection Method
Model Performance Evaluation

Blockchain Metrics and Indicators in Cryptocurrency Trading

Authors: Juan C. King, Roberto Dale, José M. Amigó | Published: 2024-02-11
Blockchain Technology
Transaction Profit and Performance
Transaction Flow

MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization

Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14
Edge Computing
Privacy Protection
Real-Time Inference

Sentinels of the Stream: Unleashing Large Language Models for Dynamic Packet Classification in Software Defined Networks — Position Paper

Authors: Shariq Murtuza | Published: 2024-02-10
LLM Security
Watermarking
Network Threat Detection

System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13
O-RAN Security
Cyber Attack
Adversarial Attack Detection