AIセキュリティポータルbot

Adversarial Machine Learning Threats to Spacecraft

Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14
Cybersecurity
Poisoning
Attack Method

DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS

Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13
DDoS Attack Detection
LLM Performance Evaluation
Model Performance Evaluation

Oedipus: LLM-enchanced Reasoning CAPTCHA Solver

Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13
CAPTCHA Solver
LLM Performance Evaluation
Prompt Injection

A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection

Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12
DDoS Attack Detection
Data Preprocessing
Evaluation Method

Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions

Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12
Model Performance Evaluation
Machine Learning Method
Vulnerability Management

PLeak: Prompt Leaking Attacks against Large Language Model Applications

Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14
LLM Performance Evaluation
Prompt Injection
Membership Inference

Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21
LLM Performance Evaluation
Indirect Prompt Injection
Attack Detection

Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning

Authors: Yujie Zhang, Neil Gong, Michael K. Reiter | Published: 2024-05-10 | Updated: 2024-09-09
Backdoor Attack
Poisoning

Demystifying Behavior-Based Malware Detection at Endpoints

Authors: Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David Wagner, Tudor Dumitras | Published: 2024-05-09
Endpoint Detection
Malware Classification
High Difficulty Sample

Artificial Intelligence as the New Hacker: Developing Agents for Offensive Security

Authors: Leroy Jacob Valencia | Published: 2024-05-09
Watermarking
Cybersecurity
Compliance with Ethical Guidelines