AIセキュリティポータルbot

Detecting Financial Bots on the Ethereum Blockchain

Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02
Blockchain Technology
Transaction Flow
Financial Intelligence

Evaluating the Efficacy of Prompt-Engineered Large Multimodal Models Versus Fine-Tuned Vision Transformers in Image-Based Security Applications

Authors: Fouad Trad, Ali Chehab | Published: 2024-03-26 | Updated: 2024-06-10
Evolution of AI
Prompt Engineering
Malware Classification

To Err is Machine: Vulnerability Detection Challenges LLM Reasoning

Authors: Benjamin Steenhoek, Md Mahbubur Rahman, Monoshi Kumar Roy, Mirza Sanjida Alam, Hengbo Tong, Swarna Das, Earl T. Barr, Wei Le | Published: 2024-03-25 | Updated: 2025-01-07
DoS Mitigation
LLM Security
Prompt Injection

Deciphering the Interplay between Local Differential Privacy, Average Bayesian Privacy, and Maximum Bayesian Privacy

Authors: Xiaojin Zhang, Yulin Fei, Wei Chen | Published: 2024-03-25 | Updated: 2024-04-02
Watermarking
Privacy Protection Method
Privacy Classification

Protecting Copyrighted Material with Unique Identifiers in Large Language Model Training

Authors: Shuai Zhao, Linchao Zhu, Ruijie Quan, Yi Yang | Published: 2024-03-23 | Updated: 2024-08-12
Watermarking
Membership Inference
Watermark Evaluation

Large Language Models for Blockchain Security: A Systematic Literature Review

Authors: Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Xiapu Luo, Ting Chen | Published: 2024-03-21 | Updated: 2025-03-24
LLM Security
Algorithm
Blockchain Technology

Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics

Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11
LLM Performance Evaluation
Model Performance Evaluation
Watermark Evaluation

Defending Against Indirect Prompt Injection Attacks With Spotlighting

Authors: Keegan Hines, Gary Lopez, Matthew Hall, Federico Zarfati, Yonatan Zunger, Emre Kiciman | Published: 2024-03-20
Indirect Prompt Injection
Prompt Injection
Malicious Prompt

Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process

Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07
Attack Method
Adversarial Example
Defense Method

ADAPT to Robustify Prompt Tuning Vision Transformers

Authors: Masih Eskandar, Tooba Imtiaz, Zifeng Wang, Jennifer Dy | Published: 2024-03-19 | Updated: 2025-02-07
Prompting Strategy
Prompt Engineering
Adversarial Training