文献データベース

Retrieval-Augmented Defense: Adaptive and Controllable Jailbreak Prevention for Large Language Models

Authors: Guangyu Yang, Jinghong Chen, Jingbiao Mei, Weizhe Lin, Bill Byrne | Published: 2025-08-22 | Updated: 2025-11-03
プロンプトインジェクション
プロンプトリーキング
脅威モデリング

Confusion is the Final Barrier: Rethinking Jailbreak Evaluation and Investigating the Real Misuse Threat of LLMs

Authors: Yu Yan, Sheng Sun, Zhe Wang, Yijun Lin, Zenghao Duan, zhifei zheng, Min Liu, Zhiyi yin, Jianping Zhang | Published: 2025-08-22 | Updated: 2025-09-15
プライバシー評価
倫理基準遵守
大規模言語モデル

Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks

Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17
アルゴリズム
プライバシー分析
評価手法

A Systematic Survey of Model Extraction Attacks and Defenses: State-of-the-Art and Perspectives

Authors: Kaixiang Zhao, Lincan Li, Kaize Ding, Neil Zhenqiang Gong, Yue Zhao, Yushun Dong | Published: 2025-08-20 | Updated: 2025-08-27
モデル抽出攻撃
知的財産保護
防御手法の統合

Foe for Fraud: Transferable Adversarial Attacks in Credit Card Fraud Detection

Authors: Jan Lum Fok, Qingwen Zeng, Shiping Chen, Oscar Fawkes, Huaming Chen | Published: 2025-08-20
モデルの頑健性保証
ロバスト性向上手法
評価手法

On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions

Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19
プライバシー設計原則
ポイズニング
毒データの検知

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19
リソース使用分析
攻撃タイプ
防御手法

AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation

Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18
RAG
プロトコル手順
マルチエージェントシステム

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
アルゴリズム設計
ハードウェアセキュリティ
脆弱性管理

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18
アルゴリズム設計
プロンプトインジェクション
攻撃タイプ