情報セキュリティ

SimKey: A Semantically Aware Key Module for Watermarking Language Models

Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03
プライバシー保護
情報セキュリティ
生成的敵対ネットワーク

MeAJOR Corpus: A Multi-Source Dataset for Phishing Email Detection

Authors: Paulo Mendes, Eva Maia, Isabel Praça | Published: 2025-07-23 | Updated: 2025-11-06
データセット統合
情報セキュリティ
深層学習手法

Thought Purity: Defense Paradigm For Chain-of-Thought Attack

Authors: Zihao Xue, Zhen Bi, Long Ma, Zhenlin Hu, Yan Wang, Zhenfang Liu, Qing Sheng, Jie Xiao, Jungang Lou | Published: 2025-07-16
情報セキュリティ
脅威モデリング
防御手法

ETrace:Event-Driven Vulnerability Detection in Smart Contracts via LLM-Based Trace Analysis

Authors: Chenyang Peng, Haijun Wang, Yin Wu, Hao Wu, Ming Fan, Yitao Zhao, Ting Liu | Published: 2025-06-18 | Updated: 2025-07-08
イベント識別
情報セキュリティ
脆弱性攻撃手法

Quantum Computing and Cybersecurity in Accounting and Finance: Current and Future Challenges and the Opportunities for Securing Accounting and Finance Systems in the Post-Quantum World

Authors: Huma Habib Shadan, Sardar Islam | Published: 2025-06-12 | Updated: 2025-07-08
リスク管理
情報セキュリティ
量子コンピューティング

LLM-Driven APT Detection for 6G Wireless Networks: A Systematic Review and Taxonomy

Authors: Muhammed Golec, Yaser Khamayseh, Suhib Bani Melhem, Abdulmalik Alwarafy | Published: 2025-05-24 | Updated: 2025-06-23
LLMとAPTの関係
情報セキュリティ
研究方法論

Select Me! When You Need a Tool: A Black-box Text Attack on Tool Selection

Authors: Liuji Chen, Hao Gao, Jinghao Zhang, Qiang Liu, Shu Wu, Liang Wang | Published: 2025-04-07
プロンプトリーキング
情報セキュリティ
敵対的サンプル

No Free Lunch with Guardrails

Authors: Divyanshu Kumar, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2025-04-01 | Updated: 2025-04-03
プロンプトインジェクション
モデルDoS
情報セキュリティ

Models That Are Interpretable But Not Transparent

Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26
モデル情報を秘匿しつつ、説明性を提供する手法
情報セキュリティ
攻撃者の行動分析

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLMの応用
リスク分析手法
情報セキュリティ