AIセキュリティポータルbot

Adversarial Contrastive Learning for LLM Quantization Attacks

Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06
Disabling Safety Mechanisms of LLM
Model Extraction Attack
Quantization and Privacy

LAsset: An LLM-assisted Security Asset Identification Framework for System-on-Chip (SoC) Verification

Authors: Md Ajoad Hasan, Dipayan Saha, Khan Thamid Hasan, Nashmin Alam, Azim Uddin, Sujan Kumar Saha, Mark Tehranipoor, Farimah Farahmandi | Published: 2026-01-06
LLM活用
Security Analysis Method
脅威モデリング自動化

Quantum AI for Cybersecurity: A hybrid Quantum-Classical models for attack path analysis

Authors: Jessica A. Sciammarelli, Waqas Ahmed | Published: 2026-01-05
Security Analysis Method
Data Preprocessing
Quantum Machine Learning

UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk

Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05
Data Selection Strategy
Privacy Enhancing Technology
Model Inversion

Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation

Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29
SQL Injection Attack Detection
Data Preprocessing
Machine Learning Technology

Toward Trustworthy Agentic AI: A Multimodal Framework for Preventing Prompt Injection Attacks

Authors: Toqeer Ali Syed, Mishal Ateeq Almutairi, Mahmoud Abdel Moaty | Published: 2025-12-29
Indirect Prompt Injection
Prompt validation
マルチモーダル安全性

Agentic AI for Autonomous Defense in Software Supply Chain Security: Beyond Provenance to Vulnerability Mitigation

Authors: Toqeer Ali Syed, Mohammad Riyaz Belgaum, Salman Jan, Asadullah Abdullah Khan, Saad Said Alqahtani | Published: 2025-12-29
LLM活用
Security Analysis Method
脆弱性優先順位付け

Securing the AI Supply Chain: What Can We Learn From Developer-Reported Security Issues and Solutions of AI Projects?

Authors: The Anh Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2025-12-29
Security Analysis Method
Data-Driven Vulnerability Assessment
Prompt leaking

EquaCode: A Multi-Strategy Jailbreak Approach for Large Language Models via Equation Solving and Code Completion

Authors: Zhen Liang, Hai Huang, Zhengkui Chen | Published: 2025-12-29
Disabling Safety Mechanisms of LLM
LLM活用
Prompt Injection

Certifying the Right to Be Forgotten: Primal-Dual Optimization for Sample and Label Unlearning in Vertical Federated Learning

Authors: Yu Jiang, Xindi Tong, Ziyao Liu, Xiaoxi Zhang, Kwok-Yan Lam, Chee Wei Tan | Published: 2025-12-29
Data Selection Strategy
Machine learning
Convergence analysis