文献データベース

No-Skim: Towards Efficiency Robustness Evaluation on Skimming-based Language Models

Authors: Shengyao Zhang, Mi Zhang, Xudong Pan, Min Yang | Published: 2023-12-15 | Updated: 2023-12-18
AIの進化
LLMセキュリティ
ウォーターマーキング

How to Raise a Robot — A Case for Neuro-Symbolic AI in Constrained Task Planning for Humanoid Assistive Robots

Authors: Niklas Hemken, Florian Jacob, Fabian Peller-Konrad, Rainer Kartmann, Tamim Asfour, Hannes Hartenstein | Published: 2023-12-14 | Updated: 2023-12-27
AIと自動化の役割
AIの進化
NSAI統合

Efficient Toxic Content Detection by Bootstrapping and Distilling Large Language Models

Authors: Jiang Zhang, Qiong Wu, Yiming Xu, Cheng Cao, Zheng Du, Konstantinos Psounis | Published: 2023-12-13
プロンプティング戦略
出力の有害度の算出
大規模言語モデル

Defenses in Adversarial Machine Learning: A Survey

Authors: Baoyuan Wu, Shaokui Wei, Mingli Zhu, Meixi Zheng, Zihao Zhu, Mingda Zhang, Hongrui Chen, Danni Yuan, Li Liu, Qingshan Liu | Published: 2023-12-13
ポイズニング
敵対的サンプル
防御手法

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning

Authors: Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun | Published: 2023-12-13
グラフ変換
セキュリティ分析
プログラム解析

Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification

Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13
GNN
フィンガープリンティング手法
ロバスト性評価

GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks

Authors: Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan | Published: 2023-12-13
GNN
データプライバシー評価
メンバーシップ推論

Maatphor: Automated Variant Analysis for Prompt Injection Attacks

Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12
LLMセキュリティ
プロンプトインジェクション
評価手法

LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature

Authors: Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud | Published: 2023-12-12
LLM性能評価
データ前処理
知識抽出手法

MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks

Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11
ポイズニング
ロバスト性評価
敵対的攻撃