Sugar-Coated Poison: Benign Generation Unlocks LLM Jailbreaking

Authors: Yu-Hang Wu, Yu-Jie Xiong, Jie-Zhang | Published: 2025-04-08

Pr$εε$mpt: Sanitizing Sensitive Prompts for LLMs

Authors: Amrita Roy Chowdhury, David Glukhov, Divyam Anshumaan, Prasad Chalasani, Nicolas Papernot, Somesh Jha, Mihir Bellare | Published: 2025-04-07

Enhancing Smart Contract Vulnerability Detection in DApps Leveraging Fine-Tuned LLM

Authors: Jiuyang Bu, Wenkai Li, Zongwei Li, Zeng Zhang, Xiaoqi Li | Published: 2025-04-07

Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection

Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07

Are You Getting What You Pay For? Auditing Model Substitution in LLM APIs

Authors: Will Cai, Tianneng Shi, Xuandong Zhao, Dawn Song | Published: 2025-04-07

Generative Large Language Model usage in Smart Contract Vulnerability Detection

Authors: Peter Ince, Jiangshan Yu, Joseph K. Liu, Xiaoning Du | Published: 2025-04-07

TrafficLLM: Enhancing Large Language Models for Network Traffic Analysis with Generic Traffic Representation

Authors: Tianyu Cui, Xinjie Lin, Sijia Li, Miao Chen, Qilei Yin, Qi Li, Ke Xu | Published: 2025-04-05 | Updated: 2025-04-15

Les Dissonances: Cross-Tool Harvesting and Polluting in Multi-Tool Empowered LLM Agents

Authors: Zichuan Li, Jian Cui, Xiaojing Liao, Luyi Xing | Published: 2025-04-04 | Updated: 2025-04-28

Accelerating IoV Intrusion Detection: Benchmarking GPU-Accelerated vs CPU-Based ML Libraries

Authors: Furkan Çolhak, Hasan Coşkun, Tsafac Nkombong Regine Cyrille, Tedi Hoxa, Mert İlhan Ecevit, Mehmet Nafiz Aydın | Published: 2025-04-02

ディープフェイク

AI技術を利用して、実在する人物の顔や音声を模倣した偽コンテンツなどを作成する技術であるディープフェイクやその対策について解説します。