AIセキュリティポータルbot

Character-Level Perturbations Disrupt LLM Watermarks

Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11
Attack Method
Digital Watermarking for Generative AI
Watermark Design

AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System

Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11
Prompt Injection
作物病害管理
農薬使用法

DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large Language Models

Authors: Honghui Xu, Shiva Shrestha, Wei Chen, Zhiyuan Li, Zhipeng Cai | Published: 2025-09-11
Privacy Technique
Convergence Analysis
Differential Privacy

Towards Confidential and Efficient LLM Inference with Dual Privacy Protection

Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11
Algorithm
Privacy Technique
Differential Privacy

Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations

Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10
Indirect Prompt Injection
Security Information Management
計画と実行のパターン

Send to which account? Evaluation of an LLM-based Scambaiting System

Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10
Disabling Safety Mechanisms of LLM
Research Methodology
詐欺対策

Efficient Decoding Methods for Language Models on Encrypted Data

Authors: Matan Avitan, Moran Baruch, Nir Drucker, Itamar Zimerman, Yoav Goldberg | Published: 2025-09-10
HEサンプリング手法
Efficiency Evaluation
Probability distribution

Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity Preservation

Authors: Duddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das | Published: 2025-09-10
Website Vulnerability
フィッシング攻撃の傾向
Visual Similarity Detection

An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection

Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08
Prompt Injection
Imbalanced Dataset
Synthetic Data Generation

Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification

Authors: Aivin V. Solatorio | Published: 2025-09-08
Hallucination
Efficient Proof System
監査手法