AIセキュリティポータルbot

Large Language Models Are Effective Code Watermarkers

Authors: Rui Xu, Jiawei Chen, Zhaoxia Yin, Cong Kong, Xinpeng Zhang | Published: 2025-10-13
Prompt leaking
Robustness
Digital Watermarking for Generative AI

Evaluating Line-level Localization Ability of Learning-based Code Vulnerability Detection Models

Authors: Marco Pintore, Giorgio Piras, Angelo Sotgiu, Maura Pintor, Battista Biggio | Published: 2025-10-13
Program Understanding
Feature Importance Analysis
Attacks on Explainability

TypePilot: Leveraging the Scala Type System for Secure LLM-generated Code

Authors: Alexander Sternfeld, Andrei Kucharavy, Ljiljana Dolamic | Published: 2025-10-13
Indirect Prompt Injection
Security Analysis Method
Prompt leaking

CoSPED: Consistent Soft Prompt Targeted Data Extraction and Defense

Authors: Yang Zhuochen, Fok Kar Wai, Thing Vrizlynn | Published: 2025-10-13
Privacy Enhancing Technology
Improvement of Learning
Defense Mechanism

Secret-Protected Evolution for Differentially Private Synthetic Text Generation

Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13
Data Protection Method
Privacy Enhancing Technology
Defense Mechanism

Adversarial Robustness in One-Stage Learning-to-Defer

Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13
Robustness
Adversarial Learning
Defense Mechanism

Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems

Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13
Adversarial Learning
Deep Reinforcement Learning
Defense Effectiveness Analysis

Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness

Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13
Privacy Enhancing Technology
Model Protection Methods
情報理論的関係

SimKey: A Semantically Aware Key Module for Watermarking Language Models

Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03
Privacy Protection
Information Security
Generative Adversarial Network

Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization

Authors: Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu | Published: 2025-10-11 | Updated: 2025-10-27
トリガーベースの透かし
画像処理手法
Watermarking Technology