AIセキュリティポータルbot

Mitigating Communications Threats in Decentralized Federated Learning through Moving Target Defense

Authors: Enrique Tomás Martínez Beltrán, Pedro Miguel Sánchez Sánchez, Sergio López Bernal, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez, Alberto Huertas Celdrán | Published: 2023-07-21 | Updated: 2023-12-09
Secure Communication Channel
Poisoning
Threat modeling

A LLM Assisted Exploitation of AI-Guardian

Authors: Nicholas Carlini | Published: 2023-07-20
Prompt Injection
Membership Inference
Watermark Robustness

DREAM: Domain-free Reverse Engineering Attributes of Black-box Model

Authors: Rongqing Li, Jiaqi Yu, Changsheng Li, Wenhan Luo, Ye Yuan, Guoren Wang | Published: 2023-07-20
Out-of-Distribution Detection
Model Extraction Attack
Improvement of Learning

LLM Censorship: A Machine Learning Challenge or a Computer Security Problem?

Authors: David Glukhov, Ilia Shumailov, Yarin Gal, Nicolas Papernot, Vardan Papyan | Published: 2023-07-20
Security Analysis
Program Verification
Attack Method

Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples

Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20
Backdoor Attack
Adversarial Attack Methods
Watermark Evaluation

Abusing Images and Sounds for Indirect Instruction Injection in Multi-Modal LLMs

Authors: Eugene Bagdasaryan, Tsung-Yin Hsieh, Ben Nassi, Vitaly Shmatikov | Published: 2023-07-19 | Updated: 2023-10-03
Indirect Prompt Injection
Malicious Prompt
Adversarial Example

What can we learn from Data Leakage and Unlearning for Law?

Authors: Jaydeep Borkar | Published: 2023-07-19
Data Leakage
Measurement of Memorization
Watermark Evaluation

The importance of feature preprocessing for differentially private linear optimization

Authors: Ziteng Sun, Ananda Theertha Suresh, Aditya Krishna Menon | Published: 2023-07-19 | Updated: 2024-02-19
Sample Complexity
Data Privacy Assessment
Optimization Problem

Rethinking Backdoor Attacks

Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19
Data Obfuscation
Backdoor Attack
Poisoning

Eliminating Label Leakage in Tree-Based Vertical Federated Learning

Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22
Membership Inference
Label Inference Attack
Watermark Evaluation