AIセキュリティポータルbot

BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability

Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05
DID文書構築
Trust Evaluation
Watermark

Information-Theoretic Decentralized Secure Aggregation with Collusion Resilience

Authors: Xiang Zhang, Zhou Li, Shuangyang Li, Kai Wan, Derrick Wing Kwan Ng, Giuseppe Caire | Published: 2025-08-01 | Updated: 2025-10-22
Privacy Enhancing Protocol
情報理論的関係
Federated Learning

LLM-Based Identification of Infostealer Infection Vectors from Screenshots: The Case of Aurora

Authors: Estelle Ruellan, Eric Clay, Nicholas Ascoli | Published: 2025-07-31
Indirect Prompt Injection
User Behavior Analysis
Malicious Website Detection

Medical Image De-Identification Benchmark Challenge

Authors: Linmin Pei, Granger Sutton, Michael Rutherford, Ulrike Wagner, Tracy Nolan, Kirk Smith, Phillip Farmer, Peter Gu, Ambar Rana, Kailing Chen, Thomas Ferleman, Brian Park, Ye Wu, Jordan Kojouharov, Gargi Singh, Jon Lemon, Tyler Willis, Milos Vukadinovic, Grant Duffy, Bryan He, David Ouyang, Marco Pereanez, Daniel Samber, Derek A. Smith, Christopher Cannistraci, Zahi Fayad, David S. Mendelson, Michele Bufano, Elmar Kotter, Hamideh Haghiri, Rajesh Baidya, Stefan Dvoretskii, Klaus H. Maier-Hein, Marco Nolden, Christopher Ablett, Silvia Siggillino, Sandeep Kaushik, Hongzhu Jiang, Sihan Xie, Zhiyu Wan, Alex Michie, Simon J Doran, Angeline Aurelia Waly, Felix A. Nathaniel Liang, Humam Arshad Mustagfirin, Michelle Grace Felicia, Kuo Po Chih, Rahul Krish, Ghulam Rasool, Nidhal Bouaynaya, Nikolas Koutsoubis, Kyle Naddeo, Kartik Pandit, Tony O'Sullivan, Raj Krish, Qinyan Pan, Scott Gustafson, Benjamin Kopchick, Laura Opsahl-Ong, Andrea Olvera-Morales, Jonathan Pinney, Kathryn Johnson, Theresa Do, Juergen Klenk, Maria Diaz, Arti Singh, Rong Chai, David A. Clunie, Fred Prior, Keyvan Farahani | Published: 2025-07-31
Data-Driven Vulnerability Assessment
測定手法の選択
Watermark Robustness

Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation

Authors: Yufei Chen, Yao Wang, Haibin Zhang, Tao Gu | Published: 2025-07-31
Poisoning attack on RAG
Privacy Assessment
Robustness of Watermarking Techniques

Empirical Evaluation of Concept Drift in ML-Based Android Malware Detection

Authors: Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen | Published: 2025-07-30
Drift Detection Method
Backdoor Detection
Robustness of Watermarking Techniques

Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection

Authors: Zhihong Liang, Xin Wang, Zhenhuang Hu, Liangliang Song, Lin Chen, Jingjing Guo, Yanbin Wang, Ye Tian | Published: 2025-07-30
Program Verification
Prompt Injection
Robustness of Watermarking Techniques

SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection

Authors: Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma | Published: 2025-07-30
Prompt leaking
Vulnerability detection
Robustness of Watermarking Techniques

Large Language Model-Based Framework for Explainable Cyberattack Detection in Automatic Generation Control Systems

Authors: Muhammad Sharshar, Ahmad Mohammad Saber, Davor Svetinovic, Amr M. Youssef, Deepa Kundur, Ehab F. El-Saadany | Published: 2025-07-29 | Updated: 2025-08-26
Indirect Prompt Injection
Data Generation Method
Hybrid Algorithm

Secure Tug-of-War (SecTOW): Iterative Defense-Attack Training with Reinforcement Learning for Multimodal Model Security

Authors: Muzhi Dai, Shixuan Liu, Zhiyuan Zhao, Junyu Gao, Hao Sun, Xuelong Li | Published: 2025-07-29
Reward Mechanism Design
Reinforcement Learning Optimization
Defense Method