AIセキュリティポータルbot

PSM: Prompt Sensitivity Minimization via LLM-Guided Black-Box Optimization

Authors: Huseein Jawad, Nicolas Brunel | Published: 2025-11-20
Privacy-Preserving Data Mining
Prompt leaking
Malicious Prompt

ART: A Graph-based Framework for Investigating Illicit Activity in Monero via Address-Ring-Transaction Structures

Authors: Andrea Venturi, Imanol Jerico-Yoldi, Francesco Zola, Raul Orduna | Published: 2025-11-20
Privacy-Preserving Data Mining
Blockchain Technology
行動分析手法

Small Language Models for Phishing Website Detection: Cost, Performance, and Privacy Trade-Offs

Authors: Georg Goldenits, Philip Koenig, Sebastian Raubitzek, Andreas Ekelhart | Published: 2025-11-19
フィッシング検出手法
Prompt Injection
Prompt Engineering

Taxonomy, Evaluation and Exploitation of IPI-Centric LLM Agent Defense Frameworks

Authors: Zimo Ji, Xunguang Wang, Zongjie Li, Pingchuan Ma, Yudong Gao, Daoyuan Wu, Xincheng Yan, Tian Tian, Shuai Wang | Published: 2025-11-19
Indirect Prompt Injection
Prompt leaking
Adaptive Misuse Detection

Can MLLMs Detect Phishing? A Comprehensive Security Benchmark Suite Focusing on Dynamic Threats and Multimodal Evaluation in Academic Environments

Authors: Jingzhuo Zhou | Published: 2025-11-19
Privacy Risk Management
Prompt Injection
Large Language Model

Towards Classifying Benign And Malicious Packages Using Machine Learning

Authors: Thanh-Cong Nguyen, Ngoc-Thanh Nguyen, Van-Giau Ung, Duc-Ly Vu | Published: 2025-11-19
動的ポリシー適応
Performance Evaluation Metrics
Classification of Malicious Actors

Critical Evaluation of Quantum Machine Learning for Adversarial Robustness

Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19
Backdoor Attack
Adversarial Learning
Quantum Machine Learning

Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection

Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18
Robustness Verification Method
Watermark Evaluation
Adaptive Misuse Detection

Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security

Authors: Hajun Kim, Hyunsik Na, Daeseon Choi | Published: 2025-11-18
Prompt Engineering
Large Language Model
Malicious Prompt

Observational Auditing of Label Privacy

Authors: Iden Kalemaj, Luca Melis, Maxime Boucher, Ilya Mironov, Saeed Mahloujifar | Published: 2025-11-18
Detection of Poison Data for Backdoor Attacks
Privacy Technique
Differential Privacy