Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29 プロンプトインジェクション実験的検証攻撃手法 2023.11.07 2025.04.03 文献データベース
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30 データ生成プライバシー手法実験的検証 2023.10.30 2025.04.03 文献データベース
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 データ生成実験的検証防御手法 2023.10.06 2025.04.03 文献データベース
Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments Authors: Maria Rigaki, Ondřej Lukáš, Carlos A. Catania, Sebastian Garcia | Published: 2023-08-23 | Updated: 2023-08-28 LLMセキュリティ実験的検証強化学習環境 2023.08.23 2025.04.03 文献データベース
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17 実験的検証脆弱性検出評価指標 2023.04.17 2025.04.03 文献データベース
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06 プロンプトインジェクション実験的検証攻撃の評価 2023.04.10 2025.04.03 文献データベース
Inductive Graph Unlearning Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07 GNNクラスタリング手法実験的検証 2023.04.06 2025.04.03 文献データベース
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 プライバシー保護技術実験的検証敵対的攻撃手法 2022.09.02 2025.04.03 文献データベース
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02 モデルの解釈性モデル性能評価実験的検証 2022.09.02 2025.04.03 文献データベース
CPS Attack Detection under Limited Local Information in Cyber Security: A Multi-node Multi-class Classification Ensemble Approach Authors: Junyi Liu, Yifu Tang, Haimeng Zhao, Xieheng Wang, Fangyu Li, Jingyi Zhang | Published: 2022-09-01 モデル性能評価実験的検証階層的分類手法 2022.09.01 2025.04.03 文献データベース