AIセキュリティポータルbot

When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection

Authors: Devanshu Sahoo, Manish Prasad, Vasudev Majhi, Jahnvi Singh, Vinay Chamola, Yash Sinha, Murari Mandal, Dhruv Kumar | Published: 2025-12-11
Indirect Prompt Injection
Adversarial Attack Analysis
Evaluation Method

Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems

Authors: N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik | Published: 2025-12-11
Detection of Poison Data for Backdoor Attacks
Privacy Enhancing Technology
Differential Privacy

D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning

Authors: Yash Srivastava, Shalin Jain, Sneha Awathare, Nitin Awathare | Published: 2025-12-11
Blockchain Technology
経済的実現可能性
Federated Learning System

Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs

Authors: Venkata Tanuja Madireddy | Published: 2025-12-11
グラフ分析
Trigger Detection
行動分析手法

FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning

Authors: Khurram Khalil, Khaza Anuarul Hoque | Published: 2025-12-10
Prompt Injection
Large Language Model
Vulnerability Assessment Method

True Random Number Generators on IQM Spark

Authors: Andrzej Gnatowski, Jarosław Rudy, Teodor Niżyński, Krzysztof Święcicki | Published: 2025-12-10
エラー解析
Statistical Hypothesis Testing
Quantum Framework

Defining Cost Function of Steganography with Large Language Models

Authors: Hanzhou Wu, Yige Wang | Published: 2025-12-10
画像処理手法
evaluation metrics
Evolutionary Score Calculation

Chasing Shadows: Pitfalls in LLM Security Research

Authors: Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr | Published: 2025-12-10
Prompt Injection
Prompt leaking

Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks

Authors: Xinye Cao, Yihan Lin, Guoshun Nan, Qinchuan Zhou, Yuhang Luo, Yurui Gao, Zeliang Zhang, Haolang Lu, Qimei Cui, Yanzhao Hou, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-12-10
SecLoopの自動化された応答機能
Cybersecurity
Reinforcement Learning

BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks

Authors: Uisang Lee, Changhoon Chung, Junmo Lee, Soo-Mook Moon | Published: 2025-12-10
Cybersecurity
Blockchain