AIは“だまし絵”に弱い?敵対的サンプルとその対策:敵対的学習

AIは私たちの生活のさまざまな場面で使われていますが、実はちょっとした“だまし絵”に引っかかってしまうことがあります。人間には気づきにくいけれど、AIが間違えやすいように細工された“だまし絵”のようなデータを「敵対的サンプル」と呼びます。

Adversarial Defense in Cybersecurity: A Systematic Review of GANs for Threat Detection and Mitigation

Authors: Tharcisse Ndayipfukamiye, Jianguo Ding, Doreen Sebastian Sarwatt, Adamu Gaston Philipo, Huansheng Ning | Published: 2025-09-24 | Updated: 2025-09-30

bi-GRPO: Bidirectional Optimization for Jailbreak Backdoor Injection on LLMs

Authors: Wence Ji, Jiancan Wu, Aiying Li, Shuyi Zhang, Junkang Wu, An Zhang, Xiang Wang, Xiangnan He | Published: 2025-09-24

Unmasking Fake Careers: Detecting Machine-Generated Career Trajectories via Multi-layer Heterogeneous Graphs

Authors: Michiharu Yamashita, Thanh Tran, Delvin Ce Zhang, Dongwon Lee | Published: 2025-09-24

Defending against Stegomalware in Deep Neural Networks with Permutation Symmetry

Authors: Birk Torpmann-Hagen, Michael A. Riegler, Pål Halvorsen, Dag Johansen | Published: 2025-09-23 | Updated: 2025-10-15

LLMs as verification oracles for Solidity

Authors: Massimo Bartoletti, Enrico Lipparini, Livio Pompianu | Published: 2025-09-23

LLM-based Vulnerability Discovery through the Lens of Code Metrics

Authors: Felix Weissberg, Lukas Pirch, Erik Imgrund, Jonas Möller, Thorsten Eisenhofer, Konrad Rieck | Published: 2025-09-23

Confidential LLM Inference: Performance and Cost Across CPU and GPU TEEs

Authors: Marcin Chrapek, Marcin Copik, Etienne Mettaz, Torsten Hoefler | Published: 2025-09-23

Detection of security smells in IaC scripts through semantics-aware code and language processing

Authors: Aicha War, Adnan A. Rawass, Abdoul K. Kabore, Jordan Samhi, Jacques Klein, Tegawende F. Bissyande | Published: 2025-09-23

MER-Inspector: Assessing model extraction risks from an attack-agnostic perspective

Authors: Xinwei Zhang, Haibo Hu, Qingqing Ye, Li Bai, Huadi Zheng | Published: 2025-09-23