AIセキュリティポータルbot

Large Language Models are Unreliable for Cyber Threat Intelligence

Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16
Few-Shot Learning
Prompt leaking
Performance Evaluation Method

Intelligent IoT Attack Detection Design via ODLLM with Feature Ranking-based Knowledge Base

Authors: Satvik Verma, Qun Wang, E. Wes Bethel | Published: 2025-03-27
DDoS Attack Detection
LLM Security
Network Traffic Analysis

Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing

Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-03-27
System Development
Prompt Injection
Large Language Model

Bayesian Pseudo Posterior Mechanism for Differentially Private Machine Learning

Authors: Robert Chew, Matthew R. Williams, Elan A. Segarra, Alexander J. Preiss, Amanda Konet, Terrance D. Savitsky | Published: 2025-03-27
Application of Text Classification
Privacy Issues
Risk Assessment

Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack

Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27
RAG
Poisoning attack on RAG
Vulnerability of Adversarial Examples

SoK: Decoding the Enigma of Encrypted Network Traffic Classifiers

Authors: Nimesha Wickramasinghe, Arash Shaghaghi, Gene Tsudik, Sanjay Jha | Published: 2025-03-25 | Updated: 2025-04-14
Dataset Applicability
Model Design and Accuracy
Overfitting

Stop Walking in Circles! Bailing Out Early in Projected Gradient Descent

Authors: Philip Doldo, Derek Everett, Amol Khanna, Andre T Nguyen, Edward Raff | Published: 2025-03-25
Vulnerability of Adversarial Examples
Adversarial Learning
Robustness of Deep Networks

Secure Edge Computing Reference Architecture for Data-driven Structural Health Monitoring: Lessons Learned from Implementation and Benchmarking

Authors: Sheikh Muhammad Farjad, Sandeep Reddy Patllola, Yonas Kassa, George Grispos, Robin Gandhi | Published: 2025-03-24
Edge Computing
Cloud Computing
Resource Usage Analysis

Defeating Prompt Injections by Design

Authors: Edoardo Debenedetti, Ilia Shumailov, Tianqi Fan, Jamie Hayes, Nicholas Carlini, Daniel Fabian, Christoph Kern, Chongyang Shi, Andreas Terzis, Florian Tramèr | Published: 2025-03-24
Indirect Prompt Injection
Prompt Injection

Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers

Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30
Malware Classification
Factors of Performance Degradation
Machine Learning Technology