AIセキュリティポータルbot

Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation

Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06
Robust Optimization
Performance Evaluation Method
Deep Learning

Prompt Injection Vulnerability of Consensus Generating Applications in Digital Democracy

Authors: Jairo Gudiño-Rosero, Clément Contet, Umberto Grandi, César A. Hidalgo | Published: 2025-08-06
Indirect Prompt Injection
Ethical Considerations
Ensuring Fairness

Leveraging large language models for SQL behavior-based database intrusion detection

Authors: Meital Shlezinger, Shay Akirav, Lei Zhou, Liang Guo, Avi Kessel, Guoliang Li | Published: 2025-08-06 | Updated: 2025-08-14
Ensemble Learning
Data Preprocessing
User Behavior Analysis

What If, But Privately: Private Counterfactual Retrieval

Authors: Shreya Meel, Mohamed Nomeir, Pasan Dissanayake, Sanghamitra Dutta, Sennur Ulukus | Published: 2025-08-05
Privacy Protection Method
Computational Complexity
通信セキュリティ

Intrusion Detection in Heterogeneous Networks with Domain-Adaptive Multi-Modal Learning

Authors: Mabin Umman Varghese, Zahra Taghiyarrenani | Published: 2025-08-05
データセットの多様性
Adversarial Learning
Deep Learning Model

When Good Sounds Go Adversarial: Jailbreaking Audio-Language Models with Benign Inputs

Authors: Bodam Kim, Hiskias Dingeto, Taeyoun Kwon, Dasol Choi, DongGeon Lee, Haon Park, JaeHoon Lee, Jongho Shin | Published: 2025-08-05
Prompt Injection
Attack Evaluation
音声モデルの脆弱性

From Legacy to Standard: LLM-Assisted Transformation of Cybersecurity Playbooks into CACAO Format

Authors: Mehdi Akbari Gurabi, Lasse Nitz, Radu-Mihai Castravet, Roman Matzutt, Avikarsha Mandal, Stefan Decker | Published: 2025-08-05
Security Analysis
Text Generation Method
Model Extraction Attack

Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS

Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05
Reinforcement Learning Attack
Attack Action Model
Watermark

VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs

Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05
Prompt Injection
Prompt leaking
Watermark

Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems

Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04
RAG
Traffic Simulation
Watermark