文献データベース

Learning and Generalization with Mixture Data

Authors: Harsh Vardhan, Avishek Ghosh, Arya Mazumdar | Published: 2025-04-29
サンプル複雑性
数学的基礎
毒データの検知

The Hidden Risks of LLM-Generated Web Application Code: A Security-Centric Evaluation of Code Generation Capabilities in Large Language Models

Authors: Swaroop Dora, Deven Lunkad, Naziya Aslam, S. Venkatesan, Sandeep Kumar Shukla | Published: 2025-04-29
インダイレクトプロンプトインジェクション
セキュアな通信チャネル
脆弱性評価手法

ReCIT: Reconstructing Full Private Data from Gradient in Parameter-Efficient Fine-Tuning of Large Language Models

Authors: Jin Xie, Ruishi He, Songze Li, Xiaojun Jia, Shouling Ji | Published: 2025-04-29
バックドアモデルの検知
プライバシー侵害
攻撃手法

Token-Efficient Prompt Injection Attack: Provoking Cessation in LLM Reasoning via Adaptive Token Compression

Authors: Yu Cui, Yujun Cai, Yiwei Wang | Published: 2025-04-29
トークン圧縮フレームワーク
プロンプトインジェクション
攻撃手法

Robustness via Referencing: Defending against Prompt Injection Attacks by Referencing the Executed Instruction

Authors: Yulin Chen, Haoran Li, Yuan Sui, Yue Liu, Yufei He, Yangqiu Song, Bryan Hooi | Published: 2025-04-29
インダイレクトプロンプトインジェクション
プロンプトの検証
攻撃手法

Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network

Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29
性能評価手法
攻撃検出
量子フレームワーク

Enhancing Leakage Attacks on Searchable Symmetric Encryption Using LLM-Based Synthetic Data Generation

Authors: Joshua Chiu, Partha Protim Paul, Zahin Wahab | Published: 2025-04-29
インダイレクトプロンプトインジェクション
攻撃手法
階層クラスタリング

A Cryptographic Perspective on Mitigation vs. Detection in Machine Learning

Authors: Greg Gluch, Shafi Goldwasser | Published: 2025-04-28 | Updated: 2025-07-10
モデルの頑健性保証
敵対的攻撃
計算問題

The Automation Advantage in AI Red Teaming

Authors: Rob Mulla, Will Pearce, Nick Landers, Brian Greunke, Brad Palm, Vincent Abruzzo, Ads Dawson | Published: 2025-04-28
プロンプトリーキング
攻撃手法
自動化の効果

CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain

Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07
プログラムの検証
性能評価
脆弱性分析