AIセキュリティポータルbot

Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots

Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16
Cyber Threat Intelligence
Prompt leaking
Model Extraction Attack

Models That Are Interpretable But Not Transparent

Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26
Method for Providing Explainability while Keeping Model Information Confidential
Information Security
Attacker Behavior Analysis

Evaluating Membership Inference Attacks in heterogeneous-data setups

Authors: Bram van Dartel, Marc Damie, Florian Hahn | Published: 2025-02-26 | Updated: 2025-04-28
Dataset Generation
Privacy Protection
Attack Type

Can Indirect Prompt Injection Attacks Be Detected and Removed?

Authors: Yulin Chen, Haoran Li, Yuan Sui, Yufei He, Yue Liu, Yangqiu Song, Bryan Hooi | Published: 2025-02-23
Prompt validation
Malicious Prompt
Attack Method

Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomous LLM Agents

Authors: Rongwu Xu, Xiaojian Li, Shuo Chen, Wei Xu | Published: 2025-02-17 | Updated: 2025-03-23
Indirect Prompt Injection
Ethical Statement
Decision-Making Dynamics

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16
Privacy Enhancing Protocol
Performance Evaluation Method
Federated Learning

RESIST: Resilient Decentralized Learning Using Consensus Gradient Descent

Authors: Cheng Fang, Rishabh Dixit, Waheed U. Bajwa, Mert Gurbuzbalaban | Published: 2025-02-11
MITM Attack
Convergence Analysis

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLM Application
Risk Analysis Method
Information Security

Membership Inference Risks in Quantized Models: A Theoretical and Empirical Study

Authors: Eric Aubinais, Philippe Formont, Pablo Piantanida, Elisabeth Gassiat | Published: 2025-02-10
Membership Inference
Quantization and Privacy

Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs

Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24
Alignment
Privacy-Preserving Data Mining
Watermark