AIセキュリティポータルbot

LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples

Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04
Hallucination
Vulnerability of Adversarial Examples
Adversarial Learning

Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives

Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16
Security Analysis
Prompt Injection
Vulnerability Prediction

Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis

Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02
DoS Mitigation
Stacking Model
Model Performance Evaluation

Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection

Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02
Watermarking
Security Analysis
Threat modeling

Learning Type Inference for Enhanced Dataflow Analysis

Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04
Watermarking
Dynamic Analysis
Evaluation Method

Performance evaluation of Machine learning algorithms for Intrusion Detection System

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01
Algorithm
Classification Pattern Analysis
Evaluation Method

Towards LLM-based Fact Verification on News Claims with a Hierarchical Step-by-Step Prompting Method

Authors: Xuan Zhang, Wei Gao | Published: 2023-09-30
Few-Shot Learning
Data Generation Method
Detection of Misinformation

The Lipschitz-Variance-Margin Tradeoff for Enhanced Randomized Smoothing

Authors: Blaise Delattre, Alexandre Araujo, Quentin Barthélemy, Alexandre Allauzen | Published: 2023-09-28 | Updated: 2024-03-18
Watermarking
Trade-off Analysis
Stability of Predictions

A Primer on Bayesian Neural Networks: Review and Debates

Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28
Algorithm
Sampling Method
Model Selection

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06
Performance Evaluation
Traffic Correlation Attack
Defense Method