AIセキュリティポータルbot

An Intelligent Native Network Slicing Security Architecture Empowered by Federated Learning

Authors: Rodrigo Moreira, Rodolfo S. Villaca, Moises R. N. Ribeiro, Joberto S. B. Martins, Joao Henrique Correa, Tereza C. Carvalho, Flavio de Oliveira Silva | Published: 2024-10-04
Network Slicing
Experimental Validation

DiSK: Differentially Private Optimizer with Simplified Kalman Filter for Noise Reduction

Authors: Xinwei Zhang, Zhiqi Bu, Borja Balle, Mingyi Hong, Meisam Razaviyayn, Vahab Mirrokni | Published: 2024-10-04 | Updated: 2025-04-29
Framework
Optimization Problem

Towards Assuring EU AI Act Compliance and Adversarial Robustness of LLMs

Authors: Tomas Bueno Momcilovic, Beat Buesser, Giulio Zizzo, Mark Purcell, Dian Balta | Published: 2024-10-04
AI Compliance
LLM Security
Framework

Developing Assurance Cases for Adversarial Robustness and Regulatory Compliance in LLMs

Authors: Tomas Bueno Momcilovic, Dian Balta, Beat Buesser, Giulio Zizzo, Mark Purcell | Published: 2024-10-04
LLM Security
Prompt Injection
Dynamic Vulnerability Management

An Intelligent Quantum Cyber-Security Framework for Healthcare Data Management

Authors: Kishu Gupta, Deepika Saxena, Pooja Rani, Jitendra Kumar, Aaisha Makkar, Ashutosh Kumar Singh, Chung-Nan Lee | Published: 2024-10-04
Privacy Protection
Quantum Framework
Quantum Cryptography Technology

FedCert: Federated Accuracy Certification

Authors: Minh Hieu Nguyen, Huu Tien Nguyen, Trung Thanh Nguyen, Manh Duong Nguyen, Trong Nghia Hoang, Truong Thao Nguyen, Phi Le Nguyen | Published: 2024-10-04
Evaluation Method

LLM Safeguard is a Double-Edged Sword: Exploiting False Positives for Denial-of-Service Attacks

Authors: Qingzhao Zhang, Ziyang Xiong, Z. Morley Mao | Published: 2024-10-03 | Updated: 2025-04-09
Prompt Injection
Model DoS

Agent Security Bench (ASB): Formalizing and Benchmarking Attacks and Defenses in LLM-based Agents

Authors: Hanrong Zhang, Jingyuan Huang, Kai Mei, Yifei Yao, Zhenting Wang, Chenlu Zhan, Hongwei Wang, Yongfeng Zhang | Published: 2024-10-03 | Updated: 2025-04-16
Backdoor Attack
Prompt Injection

Encryption-Friendly LLM Architecture

Authors: Donghwan Rho, Taeseong Kim, Minje Park, Jung Woo Kim, Hyunsik Chae, Jung Hee Cheon, Ernest K. Ryu | Published: 2024-10-03
Algorithm
Experimental Validation

Demonstration Attack against In-Context Learning for Code Intelligence

Authors: Yifei Ge, Weisong Sun, Yihang Lou, Chunrong Fang, Yiran Zhang, Yiming Li, Xiaofang Zhang, Yang Liu, Zhihong Zhao, Zhenyu Chen | Published: 2024-10-03
DICE Evaluation Method
Code Generation
Malicious Demo Construction