AIセキュリティポータルbot

Attacking interpretable NLP systems

Authors: Eldor Abdukhamidov, Tamer Abuhmed, Joanna C. S. Santos, Mohammed Abuhamad | Published: 2025-07-22
Prompt Injection
Prompt validation
Adversarial Attack Methods

DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT

Authors: Baofu Han, Bing Li, Yining Qi, Raja Jurdak, Kaibin Huang, Chau Yuen | Published: 2025-07-22
Blockchain Strategy
勾配分割手法
Performance Evaluation

Multi-Stage Prompt Inference Attacks on Enterprise LLM Systems

Authors: Andrii Balashov, Olena Ponomarova, Xiaohua Zhai | Published: 2025-07-21
Indirect Prompt Injection
Prompt Injection
Attack Detection

PhishIntentionLLM: Uncovering Phishing Website Intentions through Multi-Agent Retrieval-Augmented Generation

Authors: Wenhao Li, Selvakumar Manickam, Yung-wey Chong, Shankar Karuppayah | Published: 2025-07-21
Poisoning attack on RAG
フィッシング攻撃の意図
Prompt leaking

PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants

Authors: Ruofan Liu, Yun Lin, Silas Yeo Shuen Yu, Xiwen Teoh, Zhenkai Liang, Jin Song Dong | Published: 2025-07-21
Social Engineering Attack
Business Email Compromise
Feature Extraction

Fake or Real: The Impostor Hunt in Texts for Space Operations

Authors: Agata Kaczmarek, Dawid Płudowski, Piotr Wilczyński, Przemysław Biecek, Krzysztof Kotowski, Ramez Shendy, Jakub Nalepa, Artur Janicki, Evridiki Ntagiou | Published: 2025-07-17 | Updated: 2025-07-21
データ毒性
Detection of Misinformation
Calculation of Output Harmfulness

A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models

Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17
IoT Data Analysis Task
Performance Evaluation Method
Feature Extraction

MAD-Spear: A Conformity-Driven Prompt Injection Attack on Multi-Agent Debate Systems

Authors: Yu Cui, Hongyang Du | Published: 2025-07-17
Security Strategy Generation
Prompt leaking
Attacker Behavior Analysis

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16
Information Security
Threat modeling
Defense Method

LLAMA: Multi-Feedback Smart Contract Fuzzing Framework with LLM-Guided Seed Generation

Authors: Keke Gai, Haochen Liang, Jing Yu, Liehuang Zhu, Dusit Niyato | Published: 2025-07-16
Prompt Injection
Initial Seed Generation
Performance Evaluation Metrics