文献データベース

PIG: Privacy Jailbreak Attack on LLMs via Gradient-based Iterative In-Context Optimization

Authors: Yidan Wang, Yanan Cao, Yubing Ren, Fang Fang, Zheng Lin, Binxing Fang | Published: 2025-05-15
LLMの安全機構の解除
プロンプトインジェクション
機械学習のプライバシー保護

Adversarial Suffix Filtering: a Defense Pipeline for LLMs

Authors: David Khachaturov, Robert Mullins | Published: 2025-05-14
プロンプトの検証
倫理基準遵守
攻撃検出手法

CANTXSec: A Deterministic Intrusion Detection and Prevention System for CAN Bus Monitoring ECU Activations

Authors: Denis Donadel, Kavya Balasubramanian, Alessandro Brighente, Bhaskar Ramasubramanian, Mauro Conti, Radha Poovendran | Published: 2025-05-14
テストベッド
攻撃検出手法
電子制御ユニット

MorphMark: Flexible Adaptive Watermarking for Large Language Models

Authors: Zongqi Wang, Tianle Gu, Baoyuan Wu, Yujiu Yang | Published: 2025-05-14 | Updated: 2025-05-20
テキスト生成手法
生成AI向け電子透かし
透かしの耐久性

Evaluating the Robustness of Adversarial Defenses in Malware Detection Systems

Authors: Mostafa Jafari, Alireza Shameli-Sendi | Published: 2025-05-14
ロバスト性分析
攻撃検出手法
敵対的学習

Instantiating Standards: Enabling Standard-Driven Text TTP Extraction with Evolvable Memory

Authors: Cheng Meng, ZhengWei Jiang, QiuYun Wang, XinYi Li, ChunYan Ma, FangMing Dong, FangLi Ren, BaoXu Liu | Published: 2025-05-14
プロンプトリーキング
攻撃検出手法
知識抽出手法

Toward Malicious Clients Detection in Federated Learning

Authors: Zhihao Dou, Jiaqi Wang, Wei Sun, Zhuqing Liu, Minghong Fang | Published: 2025-05-14
トリガーの検知
ポイズニング
悪意のあるクライアント検出

Securing RAG: A Risk Assessment and Mitigation Framework

Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13
LLMセキュリティ
RAG
RAGへのポイズニング攻撃

MUBox: A Critical Evaluation Framework of Deep Machine Unlearning

Authors: Xiang Li, Bhavani Thuraisingham, Wenqi Wei | Published: 2025-05-13
クラス別忘却評価
毒データの検知
透かし技術

LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries

Authors: Zekun Wu, Seonglae Cho, Umar Mohammed, Cristian Munoz, Kleyton Costa, Xin Guan, Theo King, Ze Wang, Emre Kazim, Adriano Koshiyama | Published: 2025-05-13 | Updated: 2025-06-30
インダイレクトプロンプトインジェクション
リスク評価手法
依存関係管理