AIセキュリティポータルbot

“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation

Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19
LLM Security
Model Extraction Attack
Watermarking Technology

AdvSecureNet: A Python Toolkit for Adversarial Machine Learning

Authors: Melih Catal, Manuel Günther | Published: 2024-09-04
Toolkit Comparison
Adversarial Training
Evaluation Method

Adversarial Attacks on Machine Learning-Aided Visualizations

Authors: Takanori Fujiwara, Kostiantyn Kucher, Junpeng Wang, Rafael M. Martins, Andreas Kerren, Anders Ynnerman | Published: 2024-09-04 | Updated: 2024-09-24
Backdoor Attack
Adversarial Example
Vulnerability of Visualization

RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer

Authors: Jiangyi Deng, Xinfeng Li, Yanjiao Chen, Yijie Bai, Haiqin Weng, Yan Liu, Tao Wei, Wenyuan Xu | Published: 2024-09-03
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Exploiting the Vulnerability of Large Language Models via Defense-Aware Architectural Backdoor

Authors: Abdullah Arafat Miah, Yu Bi | Published: 2024-09-03 | Updated: 2024-09-09
Backdoor Attack
Model Performance Evaluation

DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts

Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03
Smart Contract
Blockchain Technology
Evaluation Method

Safeguarding AI Agents: Developing and Analyzing Safety Architectures

Authors: Ishaan Domkundwar, Mukunda N S, Ishaan Bhola | Published: 2024-09-03 | Updated: 2024-09-13
Content Moderation
Internal Review System
Safety Alignment

The Role of Transformer Models in Advancing Blockchain Technology: A Systematic Survey

Authors: Tianxu Liu, Yanbin Wang, Jianguo Sun, Ye Tian, Yanyu Huang, Tao Xue, Peiyue Li, Yiwei Liu | Published: 2024-09-02 | Updated: 2024-09-05
Smart Contract
Program Analysis
Blockchain Technology

Membership Inference Attacks Against In-Context Learning

Authors: Rui Wen, Zheng Li, Michael Backes, Yang Zhang | Published: 2024-09-02
Prompt Injection
Membership Inference
Attack Method

Poster: Developing an O-RAN Security Test Lab

Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02
Watermarking
Cybersecurity
Security Analysis