AIセキュリティポータルbot

Explainability Guided Adversarial Evasion Attacks on Malware Detectors

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh | Published: 2024-05-02
Watermarking
Malware Classification
Model Interpretability

ATTAXONOMY: Unpacking Differential Privacy Guarantees Against Practical Adversaries

Authors: Rachel Cummings, Shlomi Hod, Jayshree Sarathy, Marika Swanberg | Published: 2024-05-02
Privacy Protection Method
Reconstruction Durability
Watermark Robustness

Generative AI in Cybersecurity

Authors: Shivani Metta, Isaac Chang, Jack Parker, Michael P. Roman, Arturo F. Ehuan | Published: 2024-05-02
Evolution of AI
Cybersecurity
Prompt Injection

WitheredLeaf: Finding Entity-Inconsistency Bugs with LLMs

Authors: Hongbo Chen, Yifan Zhang, Xing Han, Huanyao Rong, Yuheng Zhang, Tianhao Mao, Hang Zhang, XiaoFeng Wang, Luyi Xing, Xun Chen | Published: 2024-05-02
LLM Performance Evaluation
Code Generation
Prompt Injection

Boosting Jailbreak Attack with Momentum

Authors: Yihao Zhang, Zeming Wei | Published: 2024-05-02
Watermarking
Prompt Injection
Attack Method

DLAP: A Deep Learning Augmented Large Language Model Prompting Framework for Software Vulnerability Detection

Authors: Yanjing Yang, Xin Zhou, Runfeng Mao, Jinwei Xu, Lanxin Yang, Yu Zhangm, Haifeng Shen, He Zhang | Published: 2024-05-02
Prompt Injection
Prompt Engineering
Vulnerability Management

Boosting Communication Efficiency of Federated Learning’s Secure Aggregation

Authors: Niousha Nazemi, Omid Tavallaie, Shuaijun Chen, Albert Y. Zomaya, Ralph Holz | Published: 2024-05-02
Watermarking
Privacy Protection
Communication Efficiency

LLM Security Guard for Code

Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03
LLM Security
Security Analysis
Prompt Injection

PackVFL: Efficient HE Packing for Vertical Federated Learning

Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01
Characteristics of VFL
Matrix Multiplication Methods
Computational Efficiency

Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation

Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27
LLM Performance Evaluation
Prompt Injection
State Transition Model