AIセキュリティポータルbot

Jailbreaking Text-to-Image Models with LLM-Based Agents

Authors: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo | Published: 2024-08-01 | Updated: 2024-09-09
LLM Security
Prompt Injection
Model Performance Evaluation

A Qualitative Study on Using ChatGPT for Software Security: Perception vs. Practicality

Authors: M. Mehdi Kholoosi, M. Ali Babar, Roland Croft | Published: 2024-08-01
Security Analysis
Prompt Injection
Vulnerability Management

OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack

Authors: Kuo Gai, Sicong Wang, Shihua Zhang | Published: 2024-08-01
Adversarial Training
Optimization Problem
Defense Method

A Survey on the Applications of Zero-Knowledge Proofs

Authors: Ryan Lavin, Xuekai Liu, Hardhik Mohanty, Logan Norman, Giovanni Zaarour, Bhaskar Krishnamachari | Published: 2024-08-01
Watermarking
Privacy Protection
Blockchain Technology

Cost-Effective Hallucination Detection for LLMs

Authors: Simon Valentin, Jinmiao Fu, Gianluca Detommaso, Shaoyuan Xu, Giovanni Zappella, Bryan Wang | Published: 2024-07-31 | Updated: 2024-08-09
Hallucination
Detection of Hallucinations
Generative Model

From ML to LLM: Evaluating the Robustness of Phishing Webpage Detection Models against Adversarial Attacks

Authors: Aditya Kulkarni, Vivek Balachandran, Dinil Mon Divakaran, Tamal Das | Published: 2024-07-29 | Updated: 2025-03-15
Dataset Generation
Phishing Detection
Prompt Injection

Privacy-Preserving Hierarchical Model-Distributed Inference

Authors: Fatemeh Jafarian Dehkordi, Yasaman Keshtkarjahromi, Hulya Seferoglu | Published: 2024-07-25 | Updated: 2024-09-15
Edge Computing
Privacy Protection Method
Communication Efficiency

A Hybrid Federated Kernel Regularized Least Squares Algorithm

Authors: Celeste Damiani, Yulia Rodina, Sergio Decherchi | Published: 2024-07-24
Algorithm
Watermarking
Computational Efficiency

Automated Code-centric Software Vulnerability Assessment: How Far Are We? An Empirical Study in C/C++

Authors: Anh The Nguyen, Triet Huynh Minh Le, M. Ali Babar | Published: 2024-07-24 | Updated: 2024-08-03
Deep Learning Method
Vulnerability Management
Evaluation Method

From Sands to Mansions: Towards Automated Cyberattack Emulation with Classical Planning and Large Language Models

Authors: Lingzhi Wang, Zhenyuan Li, Yi Jiang, Zhengkai Wang, Zonghan Guo, Jiahui Wang, Yangyang Wei, Xiangmin Shen, Wei Ruan, Yan Chen | Published: 2024-07-24 | Updated: 2025-04-17
Prompt leaking
Attack Action Model
Attack Detection Method