AIセキュリティポータルbot

Gender bias and stereotypes in Large Language Models

Authors: Hadas Kotek, Rikker Dockum, David Q. Sun | Published: 2023-08-28
Bias Detection in AI Output
Algorithm Fairness
Large Language Model

Generating tabular datasets under differential privacy

Authors: Gianluca Truda | Published: 2023-08-28
Data Generation
Privacy Protection
Privacy Protection Method

Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection?

Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28
Out-of-Distribution Detection
Unknown Attack Detection
Machine Learning Method

Detecting Language Model Attacks with Perplexity

Authors: Gabriel Alon, Michael Kamfonas | Published: 2023-08-27 | Updated: 2023-11-07
LLM Security
Prompt Injection
Malicious Prompt

LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors

Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14
Trigger Detection
Backdoor Detection
Attack Method

Uncovering Promises and Challenges of Federated Learning to Detect Cardiovascular Diseases: A Scoping Literature Review

Authors: Sricharan Donkada, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Nasrin Dehbozorgi, Nazmus Sakib, Quan Z. Sheng | Published: 2023-08-26
Smart Healthcare
Threats of Medical AI
Federated Learning

Active learning for fast and slow modeling attacks on Arbiter PUFs

Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25
Evaluation Methods for PUF
Active Learning
Machine Learning Method

ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching

Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24
LLM Security
Vulnerability Mitigation Technique
Watermark Robustness

Use of LLMs for Illicit Purposes: Threats, Prevention Measures, and Vulnerabilities

Authors: Maximilian Mozes, Xuanli He, Bennett Kleinberg, Lewis D. Griffin | Published: 2023-08-24
Prompt Injection
Malicious Content Generation
Adversarial Example

Vulnerability Clustering and other Machine Learning Applications of Semantic Vulnerability Embeddings

Authors: Mark-Oliver Stehr, Minyoung Kim | Published: 2023-08-23
Clustering methods
Membership Inference
Machine Learning Method