AIセキュリティポータルbot

MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files

Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08
Watermarking
Malware Classification
Watermarking Settings for Medical Data

The Philosopher’s Stone: Trojaning Plugins of Large Language Models

Authors: Tian Dong, Minhui Xue, Guoxing Chen, Rayne Holland, Yan Meng, Shaofeng Li, Zhen Liu, Haojin Zhu | Published: 2023-12-01 | Updated: 2024-09-11
Prompt Injection
Poisoning
Poisoning Attack

Exploring the Robustness of Decentralized Training for Large Language Models

Authors: Lin Lu, Chenxi Dai, Wangcheng Tao, Binhang Yuan, Yanan Sun, Pan Zhou | Published: 2023-12-01
Privacy Protection Method
Poisoning
Poisoning Attack

Mark My Words: Analyzing and Evaluating Language Model Watermarks

Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner | Published: 2023-12-01 | Updated: 2024-10-11
Prompt Injection
Watermark Robustness
Watermark Evaluation

Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems

Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30
Watermarking
Robustness Evaluation
Adversarial attack

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
Watermarking
Cryptography
Cryptography

Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models

Authors: Mohamed R. Shoaib, Zefan Wang, Milad Taleby Ahvanooey, Jun Zhao | Published: 2023-11-29
Role of AI and Automation
Content Moderation
Privacy Protection

ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Misuse Cases in the Era of Generative AI and Cloud-based Health Information Ecosystem

Authors: Khalid Al-hammuri, Fayez Gebali, Awos Kanan | Published: 2023-11-28
Zero Trust
Advancements in Medical IoT
Watermarking Settings for Medical Data

Scalable Extraction of Training Data from (Production) Language Models

Authors: Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tramèr, Katherine Lee | Published: 2023-11-28
Data Leakage
Training Data Extraction Method
Prompt Injection

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
Watermarking
Data Obfuscation
Watermarking Settings for Medical Data