AIセキュリティポータルbot

Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach

Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani | Published: 2024-06-04
DDoS Attack Detection
Few-Shot Learning
Prototype Network

Safeguarding Large Language Models: A Survey

Authors: Yi Dong, Ronghui Mu, Yanghao Zhang, Siqi Sun, Tianle Zhang, Changshun Wu, Gaojie Jin, Yi Qi, Jinwei Hu, Jie Meng, Saddek Bensalem, Xiaowei Huang | Published: 2024-06-03
LLM Security
Guardrail Method
Prompt Injection

Model for Peanuts: Hijacking ML Models without Training Access is Possible

Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani | Published: 2024-06-03
Membership Inference
Attack Method
Face Recognition System

Decoupled Alignment for Robust Plug-and-Play Adaptation

Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06
LLM Performance Evaluation
Prompt Injection
Model Performance Evaluation

Differentially Private Tabular Data Synthesis using Large Language Models

Authors: Toan V. Tran, Li Xiong | Published: 2024-06-03
Dataset Generation
Privacy Protection Method
Model Performance Evaluation

PrivacyRestore: Privacy-Preserving Inference in Large Language Models via Privacy Removal and Restoration

Authors: Ziqian Zeng, Jianwei Wang, Junyao Yang, Zhengdong Lu, Haoran Li, Huiping Zhuang, Cen Chen | Published: 2024-06-03 | Updated: 2025-05-28
LLM Security
Privacy Classification
Differential Privacy

BELLS: A Framework Towards Future Proof Benchmarks for the Evaluation of LLM Safeguards

Authors: Diego Dorn, Alexandre Variengien, Charbel-Raphaël Segerie, Vincent Corruble | Published: 2024-06-03
LLM Security
Content Moderation
Prompt Injection

FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation

Authors: Hanlin Gu, Jiahuan Luo, Yan Kang, Yuan Yao, Gongxi Zhu, Bowen Li, Lixin Fan, Qiang Yang | Published: 2024-06-03
Watermarking
Privacy Protection Method
Model Performance Evaluation

No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning

Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello | Published: 2024-06-03
Watermarking
Backdoor Attack
Poisoning

Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients

Authors: Weijun Li, Qiongkai Xu, Mark Dras | Published: 2024-06-03 | Updated: 2024-10-04
Watermarking
Data Privacy Assessment
Privacy Protection Method