AIセキュリティポータルbot

Auditing Differential Privacy Guarantees Using Density Estimation

Authors: Antti Koskela, Jafar Mohammadi | Published: 2024-06-07 | Updated: 2024-10-11
Privacy Protection Method
Evaluation Method
Watermark Evaluation

GENIE: Watermarking Graph Neural Networks for Link Prediction

Authors: Venkata Sai Pranav Bachina, Ankit Gangwal, Aaryan Ajay Sharma, Charu Sharma | Published: 2024-06-07 | Updated: 2025-01-12
Watermarking
Prompt Injection
Watermark Robustness

When Swarm Learning meets energy series data: A decentralized collaborative learning design based on blockchain

Authors: Lei Xu, Yulong Chen, Yuntian Chen, Longfeng Nie, Xuetao Wei, Liang Xue, Dongxiao Zhang | Published: 2024-06-07
Energy Management
Blockchain Technology
Machine Learning Method

Contrastive explainable clustering with differential privacy

Authors: Dung Nguyen, Ariel Vetzler, Sarit Kraus, Anil Vullikanti | Published: 2024-06-07
Algorithm
Watermarking
Privacy Protection Method

Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning

Authors: Xuhan Zuo, Minghao Wang, Tianqing Zhu, Lefeng Zhang, Dayong Ye, Shui Yu, Wanlei Zhou | Published: 2024-06-06
LLM Performance Evaluation
Privacy Protection
Blockchain Technology

AutoJailbreak: Exploring Jailbreak Attacks and Defenses through a Dependency Lens

Authors: Lin Lu, Hai Yan, Zenghui Yuan, Jiawen Shi, Wenqi Wei, Pin-Yu Chen, Pan Zhou | Published: 2024-06-06
LLM Performance Evaluation
Prompt Injection
Defense Method

Generalization-Enhanced Code Vulnerability Detection via Multi-Task Instruction Fine-Tuning

Authors: Xiaohu Du, Ming Wen, Jiahao Zhu, Zifan Xie, Bin Ji, Huijun Liu, Xuanhua Shi, Hai Jin | Published: 2024-06-06
CVE Information Extraction
LLM Performance Evaluation
Vulnerability Management

BadAgent: Inserting and Activating Backdoor Attacks in LLM Agents

Authors: Yifei Wang, Dizhan Xue, Shengjie Zhang, Shengsheng Qian | Published: 2024-06-05
LLM Security
Backdoor Attack
Prompt Injection

Nonlinear Transformations Against Unlearnable Datasets

Authors: Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost | Published: 2024-06-05
Data Protection Method
Model Performance Evaluation
Adversarial Example

Large Language Models as Carriers of Hidden Messages

Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05
Algorithm
Fingerprinting Method
Watermark Design