あなたは騙されない?ディープフェイクがもたらす偽情報とその対策New AI技術を利用して、実在する人物の顔や音声を模倣して偽コンテンツなどを作成する技術であるディープフェイクやその対策について解説します。 2025.05.21 一般読者向け解説記事
Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 2025.05.21 文献データベース
Adaptive Plan-Execute Framework for Smart Contract Security Auditing Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 2025.05.21 文献データベース
A Linear Approach to Data Poisoning Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21 2025.05.21 文献データベース
A Survey On Secure Machine Learning Authors: Taobo Liao, Taoran Li, Prathamesh Nadkarni | Published: 2025-05-21 2025.05.21 文献データベース
TSA-WF: Exploring the Effectiveness of Time Series Analysis for Website Fingerprinting Authors: Michael Wrana, Uzma Maroof, Diogo Barradas | Published: 2025-05-20 2025.05.20 文献データベース
sudoLLM : On Multi-role Alignment of Language Models Authors: Soumadeep Saha, Akshay Chaturvedi, Joy Mahapatra, Utpal Garain | Published: 2025-05-20 2025.05.20 文献データベース
Can Large Language Models Really Recognize Your Name? Authors: Dzung Pham, Peter Kairouz, Niloofar Mireshghallah, Eugene Bagdasarian, Chau Minh Pham, Amir Houmansadr | Published: 2025-05-20 2025.05.20 文献データベース
Is Your Prompt Safe? Investigating Prompt Injection Attacks Against Open-Source LLMs Authors: Jiawen Wang, Pritha Gupta, Ivan Habernal, Eyke Hüllermeier | Published: 2025-05-20 2025.05.20 文献データベース
Exploring Jailbreak Attacks on LLMs through Intent Concealment and Diversion Authors: Tiehan Cui, Yanxu Mao, Peipei Liu, Congying Liu, Datao You | Published: 2025-05-20 2025.05.20 文献データベース