文献データベース

Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks

Authors: Yixiao Xu, Binxing Fang, Rui Wang, Yinghai Zhou, Shouling Ji, Yuan Liu, Mohan Li, Zhihong Tian | Published: 2025-01-16 | Updated: 2025-01-17
ウォーターマーキング
モデル抽出攻撃
攻撃の評価

Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography

Authors: Ilia Shumailov, Daniel Ramage, Sarah Meiklejohn, Peter Kairouz, Florian Hartmann, Borja Balle, Eugene Bagdasarian | Published: 2025-01-15
Trusted Capable Model Environments
プライバシー保護
暗号学

Multilingual Email Phishing Attacks Detection using OSINT and Machine Learning

Authors: Panharith An, Rana Shafi, Tionge Mughogho, Onyango Allan Onyango | Published: 2025-01-15
フィッシング検出
分類モデル

Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack

Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14
サイバーセキュリティ
プライバシー保護
大規模言語モデル

Gandalf the Red: Adaptive Security for LLMs

Authors: Niklas Pfister, Václav Volhejn, Manuel Knott, Santiago Arias, Julia Bazińska, Mykhailo Bichurin, Alan Commike, Janet Darling, Peter Dienes, Matthew Fiedler, David Haber, Matthias Kraft, Marco Lancini, Max Mathys, Damián Pascual-Ortiz, Jakub Podolak, Adrià Romero-López, Kyriacos Shiarlis, Andreas Signer, Zsolt Terek, Athanasios Theocharis, Daniel Timbrell, Samuel Trautwein, Samuel Watts, Yun-Han Wu, Mateo Rojas-Carulla | Published: 2025-01-14 | Updated: 2025-08-04
プロンプトインジェクション
モデル抽出攻撃
ユーザ行動分析

Unveiling Provider Bias in Large Language Models for Code Generation

Authors: Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Qingshuang Bao, Weipeng Jiang, Chao Shen, Yang Liu | Published: 2025-01-14
コード生成
バイアス
プロンプトインジェクション

Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection

Authors: Sina Ahmadi | Published: 2025-01-14
サイバーセキュリティ
ネットワーク脅威検出
動的ファイアウォール

A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS

Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13
IoMTセキュリティ
サイバーセキュリティ

Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards

Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13
サイバーセキュリティ
大規模言語モデル
攻撃の評価

A Novel Approach to Network Traffic Analysis: the HERA tool

Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13
サイバーセキュリティ
データセット生成
ネットワーク脅威検出