AIセキュリティポータルbot

LLMs Killed the Script Kiddie: How Agents Supported by Large Language Models Change the Landscape of Network Threat Testing

Authors: Stephen Moskal, Sam Laney, Erik Hemberg, Una-May O'Reilly | Published: 2023-10-10
Prompt Injection
Information Gathering Methods
Threat Actor Support

Text Embeddings Reveal (Almost) As Much As Text

Authors: John X. Morris, Volodymyr Kuleshov, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-10-10
Membership Inference
Model Inversion
Model Evaluation

Statistical properties and privacy guarantees of an original distance-based fully synthetic data generation method

Authors: Rémy Chapelle, Bruno Falissard | Published: 2023-10-10
Data Generation
Privacy Classification
Membership Disclosure Risk

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation

SCAR: Power Side-Channel Analysis at RTL-Level

Authors: Amisha Srivastava, Sanjay Das, Navnil Choudhury, Rafail Psiakis, Pedro Henrique Silva, Debjit Pal, Kanad Basu | Published: 2023-10-10
Prompt Injection
Cryptography
Vulnerability Prediction

Differentially Private Multi-Site Treatment Effect Estimation

Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10
Privacy Classification
Performance Evaluation
Information Hiding Techniques

LLM for SoC Security: A Paradigm Shift

Authors: Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi | Published: 2023-10-09
LLM Application
Prompt Injection
Vulnerability detection

Adversarial Attacks on Combinatorial Multi-Armed Bandits

Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04
Algorithm
Watermarking
Machine Learning Method

Transferable Availability Poisoning Attacks

Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06
Poisoning
Selection and Evaluation of Optimization Algorithms
Machine Learning Method

Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation

Authors: Sunpreet Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani | Published: 2023-10-06
Privacy Protection Method
Multi-Party Computation
Federated Learning