モデル抽出攻撃

Kraken: Higher-order EM Side-Channel Attacks on DNNs in Near and Far Field

Authors: Peter Horvath, Ilia Shumailov, Lukasz Chmielewski, Lejla Batina, Yuval Yarom | Published: 2026-03-03
LLM性能評価
モデル抽出攻撃

RobPI: Robust Private Inference against Malicious Client

Authors: Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2026-02-23
モデル抽出攻撃
敵対的学習
防御メカニズム

LLM-enabled Applications Require System-Level Threat Monitoring

Authors: Yedi Zhang, Haoyu Wang, Xianglin Yang, Jin Song Dong, Jun Sun | Published: 2026-02-23
RAGへのポイズニング攻撃
モデル抽出攻撃
監視手法

SafePickle: Robust and Generic ML Detection of Malicious Pickle-based ML Models

Authors: Hillel Ohayon, Daniel Gilkarov, Ran Dubin | Published: 2026-02-23
マルウェア検出
マルウェア検出手法
モデル抽出攻撃

Comparative Insights on Adversarial Machine Learning from Industry and Academia: A User-Study Approach

Authors: Vishruti Kakkad, Paul Chung, Hanan Hibshi, Maverick Woo | Published: 2026-02-04
ポイズニング
モデル抽出攻撃
教育手法

Semantic Consensus Decoding: Backdoor Defense for Verilog Code Generation

Authors: Guang Yang, Xing Hu, Xiang Chen, Xin Xia | Published: 2026-02-04
コード生成のセキュリティ
バックドアモデルの検知
モデル抽出攻撃

ICL-EVADER: Zero-Query Black-Box Evasion Attacks on In-Context Learning and Their Defenses

Authors: Ningyuan He, Ronghong Huang, Qianqian Tang, Hongyu Wang, Xianghang Mi, Shanqing Guo | Published: 2026-01-29
データ毒性攻撃
プロンプトリーキング
モデル抽出攻撃

An Empirical Study on Remote Code Execution in Machine Learning Model Hosting Ecosystems

Authors: Mohammed Latif Siddiq, Tanzim Hossain Romel, Natalie Sekerak, Beatrice Casey, Joanna C. S. Santos | Published: 2026-01-20
セキュリティ保証
データ駆動型脆弱性評価
モデル抽出攻撃

JPU: Bridging Jailbreak Defense and Unlearning via On-Policy Path Rectification

Authors: Xi Wang, Songlei Jian, Shasha Li, Xiaopeng Li, Zhaoye Li, Bin Ji, Baosheng Wang, Jie Yu | Published: 2026-01-06
プロンプトインジェクション
モデル抽出攻撃
敵対的攻撃検出

Adversarial Contrastive Learning for LLM Quantization Attacks

Authors: Dinghong Song, Zhiwei Xu, Hai Wan, Xibin Zhao, Pengfei Su, Dong Li | Published: 2026-01-06
LLMの安全機構の解除
モデル抽出攻撃
量子化とプライバシー