Generative AI in Financial Institution: A Global Survey of Opportunities, Threats, and Regulation Authors: Bikash Saha, Nanda Rani, Sandeep Kumar Shukla | Published: 2025-04-30 プロンプトリーキング倫理的ガイドライン遵守金融サービスにおける生成AI 2025.04.30 2025.05.12 Literature Database
Padding Matters — Exploring Function Detection in PE Files Authors: Raphael Springer, Alexander Schmitz, Artur Leinweber, Tobias Urban, Christian Dietrich | Published: 2025-04-30 PEマルウェア分類プログラム解析関数境界ペア形成 2025.04.30 2025.05.12 Literature Database
How to Backdoor the Knowledge Distillation Authors: Chen Wu, Qian Ma, Prasenjit Mitra, Sencun Zhu | Published: 2025-04-30 バックドア攻撃敵対的学習知識蒸留の脆弱性 2025.04.30 2025.05.12 Literature Database
ACE: A Security Architecture for LLM-Integrated App Systems Authors: Evan Li, Tushin Mallick, Evan Rose, William Robertson, Alina Oprea, Cristina Nita-Rotaru | Published: 2025-04-29 | Updated: 2025-05-07 インダイレクトプロンプトインジェクションプロンプトインジェクション情報フロー分析 2025.04.29 2025.05.12 Literature Database
Secure Coding with AI, From Creation to Inspection Authors: Vladislav Belozerov, Peter J Barclay, Ashkan Sami | Published: 2025-04-29 データセットの適用性プログラム解析脆弱性管理 2025.04.29 2025.05.12 Literature Database
Unlocking User-oriented Pages: Intention-driven Black-box Scanner for Real-world Web Applications Authors: Weizhe Wang, Yao Zhang, Kaitai Liang, Guangquan Xu, Hongpeng Bai, Qingyang Yan, Xi Zheng, Bin Wu | Published: 2025-04-29 | Updated: 2025-04-30 コンテンツ圧縮手法ユーザー行動分析脆弱性評価手法 2025.04.29 2025.05.12 Literature Database
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29 オンライン学習ポイズニング性能評価 2025.04.29 2025.05.12 Literature Database
Learning and Generalization with Mixture Data Authors: Harsh Vardhan, Avishek Ghosh, Arya Mazumdar | Published: 2025-04-29 サンプル複雑性数学的基礎毒データの検知 2025.04.29 2025.05.12 Literature Database
The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29 インダイレクトプロンプトインジェクションセキュアな通信チャネル脆弱性評価手法 2025.04.29 2025.05.12 Literature Database
ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29 バックドアモデルの検知プライバシー侵害攻撃手法 2025.04.29 2025.05.12 Literature Database