Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM Reasoning via Adaptive Token Compression Authors: Yu Cui, Yujun Cai, Yiwei Wang | Published: 2025-04-29 トークン圧縮フレームワークプロンプトインジェクション攻撃手法 2025.04.29 2025.05.12 Literature Database
Robustness via Referencing: Defending against Prompt Injection Attacks by Referencing the Executed Instruction Authors: Yulin Chen, Haoran Li, Yuan Sui, Yue Liu, Yufei He, Yangqiu Song, Bryan Hooi | Published: 2025-04-29 インダイレクトプロンプトインジェクションプロンプトの検証攻撃手法 2025.04.29 2025.05.12 Literature Database
Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29 性能評価手法攻撃検出量子フレームワーク 2025.04.29 2025.05.12 Literature Database
Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation Authors: Joshua Chiu, Partha Protim Paul, Zahin Wahab | Published: 2025-04-29 インダイレクトプロンプトインジェクション攻撃手法階層クラスタリング 2025.04.29 2025.05.12 Literature Database
The Automation Advantage in AI Red Teaming Authors: Rob Mulla, Ads Dawson, Vincent Abruzzon, Brian Greunke, Nick Landers, Brad Palm, Will Pearce | Published: 2025-04-28 | Updated: 2025-04-29 プロンプトリーキング攻撃手法自動化の効果 2025.04.28 2025.05.12 Literature Database
CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07 プログラムの検証性能評価脆弱性分析 2025.04.28 2025.05.12 Literature Database
$\texttt{SAGE}$: A Generic Framework for LLM Safety Evaluation Authors: Madhur Jindal, Hari Shrawgi, Parag Agrawal, Sandipan Dandapat | Published: 2025-04-28 ユーザー識別システム大規模言語モデル安全性と有用性のトレードオフ 2025.04.28 2025.05.12 Literature Database
Can Differentially Private Fine-tuning LLMs Protect Against Privacy Attacks? Authors: Hao Du, Shang Liu, Yang Cao | Published: 2025-04-28 | Updated: 2025-05-01 プライバシーリスク管理メンバーシップ開示リスク差分プライバシー 2025.04.28 2025.05.12 Literature Database
BadMoE: Backdooring Mixture-of-Experts LLMs via Optimizing Routing Triggers and Infecting Dormant Experts Authors: Qingyue Wang, Qi Pang, Xixun Lin, Shuai Wang, Daoyuan Wu | Published: 2025-04-24 | Updated: 2025-04-29 RAGへのポイズニング攻撃バックドア攻撃手法攻撃手法 2025.04.24 2025.05.12 Literature Database
Evaluating the Vulnerability of ML-Based Ethereum Phishing Detectors to Single-Feature Adversarial Perturbations Authors: Ahod Alghuried, Ali Alkinoon, Abdulaziz Alghamdi, Soohyeon Choi, Manar Mohaisen, David Mohaisen | Published: 2025-04-24 フィッシング攻撃の検出率モデルの頑健性保証敵対的サンプルの検知 2025.04.24 2025.05.12 Literature Database