AIセキュリティポータルbot

A Robust Semantics-based Watermark for Large Language Model against Paraphrasing

Authors: Jie Ren, Han Xu, Yiding Liu, Yingqian Cui, Shuaiqiang Wang, Dawei Yin, Jiliang Tang | Published: 2023-11-15 | Updated: 2024-04-01
Prompt Injection
Robustness Evaluation
Information Hiding Techniques

KnowSafe: Combined Knowledge and Data Driven Hazard Mitigation in Artificial Pancreas Systems

Authors: Xugui Zhou, Maxfield Kouzel, Chloe Smith, Homa Alemzadeh | Published: 2023-11-13
Control Model of CPS
Control Action Generation
Risk Prediction and Mitigation

Adversarial Purification for Data-Driven Power System Event Classifiers with Diffusion Models

Authors: Yuanbin Cheng, Koji Yamashita, Jim Follum, Nanpeng Yu | Published: 2023-11-13
Adversarial Text Purification
Optimization Problem
Defense Method

Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks

Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11
Improvement of Learning
Deep Learning Method
Defense Method

Does Differential Privacy Prevent Backdoor Attacks in Practice?

Authors: Fereshteh Razmi, Jian Lou, Li Xiong | Published: 2023-11-10
Data Privacy Assessment
Trade-off Analysis
Defense Method

Watermarking Vision-Language Pre-trained Models for Multi-modal Embedding as a Service

Authors: Yuanmin Tang, Jing Yu, Keke Gai, Xiangyan Qu, Yue Hu, Gang Xiong, Qi Wu | Published: 2023-11-10
Data Privacy Assessment
Membership Inference
Copyright Trap

RAGLog: Log Anomaly Detection using Retrieval Augmented Generation

Authors: Jonathan Pan, Swee Liang Wong, Yidi Yuan | Published: 2023-11-09
Clustering methods
Class Imbalance
Challenges of Log Analysis

DEMASQ: Unmasking the ChatGPT Wordsmith

Authors: Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi | Published: 2023-11-08
Energy-Based Model
Prompt Injection
Evaluation Method

Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection

Authors: Akshit Jindal, Vikram Goyal, Saket Anand, Chetan Arora | Published: 2023-11-08
Data Selection Strategy
Membership Inference
Improvement of Learning

CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks

Authors: Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram | Published: 2023-11-08
Optimization Methods
Deep Learning Method
Computational Complexity