AIセキュリティポータルbot

Critical Infrastructure Protection: Generative AI, Challenges, and Opportunities

Authors: Yagmur Yigit, Mohamed Amine Ferrag, Iqbal H. Sarker, Leandros A. Maglaras, Christos Chrysoulas, Naghmeh Moradpoor, Helge Janicke | Published: 2024-05-08
Cybersecurity
Privacy Protection
Risk Management

Large Language Models for Cyber Security: A Systematic Literature Review

Authors: Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang | Published: 2024-05-08 | Updated: 2025-05-15
LLM Security
Indirect Prompt Injection
文献レビュー

AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models

Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08
Cybersecurity
Threat modeling
Evaluation Method

Inferring Discussion Topics about Exploitation of Vulnerabilities from Underground Hacking Forums

Authors: Felipe Moreno-Vera | Published: 2024-05-07
Cybersecurity
Data Preprocessing
Vulnerability Management

Revisiting Character-level Adversarial Attacks for Language Models

Authors: Elias Abad Rocamora, Yongtao Wu, Fanghui Liu, Grigorios G. Chrysos, Volkan Cevher | Published: 2024-05-07 | Updated: 2024-09-04
Watermarking
Loss Function
Attack Method

The Malware as a Service ecosystem

Authors: Constantinos Patsakis, David Arroyo, Fran Casino | Published: 2024-05-07
Cybersecurity
Money Laundering Techniques
Malware Classification

Differentially Private Post-Processing for Fair Regression

Authors: Ruicheng Xian, Qiaobo Li, Gautam Kamath, Han Zhao | Published: 2024-05-07
Watermarking
Privacy Protection Method
Fairness evaluation

Locally Differentially Private In-Context Learning

Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08
Watermarking
Privacy Protection Method
Prompt Injection

Explainability-Informed Targeted Malware Misclassification

Authors: Quincy Card, Kshitiz Aryal, Maanak Gupta | Published: 2024-05-07
Poisoning
Malware Classification
Dynamic Analysis

IPFed: Identity protected federated learning for user authentication

Authors: Yosuke Kaga, Yusei Suzuki, Kenta Takahashi | Published: 2024-05-07
Privacy Protection Method
Membership Inference
Face Recognition System