AIセキュリティポータルbot

Dynamic Black-box Backdoor Attacks on IoT Sensory Data

Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18
Trigger Detection
Backdoor Attack
Generative Model

GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards

Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18
Privacy Technique
Membership Inference
Differential Privacy

TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone

Authors: Xunjie Wang, Jiacheng Shi, Zihan Zhao, Yang Yu, Zhichao Hua, Jinyu Gu | Published: 2025-11-17
Prompt leaking
Model DoS
Performance Evaluation Metrics

Robust Client-Server Watermarking for Split Federated Learning

Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17
Trigger Detection
Privacy Technique
Watermark Evaluation

ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models

Authors: Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu | Published: 2025-11-17
Prompt Injection
Large Language Model
Evolutionary Algorithm

Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP

Authors: Elodie Mutombo Ngoie, Mike Nkongolo Wa Nkongolo, Peace Azugo, Mahmut Tokmak | Published: 2025-11-17
Membership Inference
Deep Learning-Based IDS
Feature Selection Method

Tight and Practical Privacy Auditing for Differentially Private In-Context Learning

Authors: Yuyang Xia, Ruixuan Liu, Li Xiong | Published: 2025-11-17
Privacy Technique
Anonymization Technology
Differential Privacy

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
Trigger Detection
Backdoor Attack
Watermark Evaluation

Whistledown: Combining User-Level Privacy with Conversational Coherence in LLMs

Authors: Chelsea McMurray, Hayder Tirmazi | Published: 2025-11-17
Privacy Risk Management
Privacy Assurance
Privacy Technique

DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents

Authors: Fuyao Zhang, Jiaming Zhang, Che Wang, Xiongtao Sun, Yurong Hao, Guowei Guan, Wenjie Li, Longtao Huang, Wei Yang Bryan Lim | Published: 2025-11-17
Privacy Technique
Generative Model
Watermark Evaluation