AIセキュリティポータルbot

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17
LLM Performance Evaluation
Cybersecurity
Prompt Injection

Uncertainty quantification by block bootstrap for differentially private stochastic gradient descent

Authors: Holger Dette, Carina Graw | Published: 2024-05-21
Simulation Result Evaluation
Privacy Protection Method
Optimization Problem

Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification

Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20
Security Analysis
Prompt Injection
Vulnerability Management

Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS

Authors: Maho Kajiura, Junya Nakamura | Published: 2024-05-20
Network Threat Detection
Framework
Machine Learning Method

GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction

Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20
Model Performance Evaluation
Attack Evaluation
Attack Method

Information Leakage from Embedding in Large Language Models

Authors: Zhipeng Wan, Anda Cheng, Yinggui Wang, Lei Wang | Published: 2024-05-20 | Updated: 2024-05-22
LLM Performance Evaluation
Membership Inference
Model Performance Evaluation

Geometry-Aware Instrumental Variable Regression

Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19
Watermarking
Optimization Problem
Evaluation Method

A GAN-Based Data Poisoning Attack Against Federated Learning Systems and Its Countermeasure

Authors: Wei Sun, Bo Gao, Ke Xiong, Yuwei Wang | Published: 2024-05-19 | Updated: 2024-05-21
Backdoor Attack
Poisoning
Defense Method

A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks

Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15
Model Performance Evaluation
Anomaly Detection Method
Evaluation Method

Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing

Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18
Model Performance Evaluation
Evaluation Method
Watermark Evaluation