Nothing Special   »   [go: up one dir, main page]

Tsamados et al., 2023 - Google Patents

The cybersecurity crisis of artificial intelligence: unrestrained adoption and natural language-based attacks

Tsamados et al., 2023

View PDF
Document ID
12415739128182415465
Author
Tsamados A
Floridi L
Taddeo M
Publication year
Publication venue
arXiv preprint arXiv:2311.09224

External Links

Snippet

The widespread integration of autoregressive-large language models (AR-LLMs), such as ChatGPT, across established applications, like search engines, has introduced critical vulnerabilities with uniquely scalable characteristics. In this commentary, we analyse these …
Continue reading at arxiv.org (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30634Querying
    • G06F17/30657Query processing
    • G06F17/30675Query execution
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30613Indexing
    • G06F17/30619Indexing indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F17/00Digital computing or data processing equipment or methods, specially adapted for specific functions
    • G06F17/30Information retrieval; Database structures therefor; File system structures therefor
    • G06F17/3061Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F17/30731Creation of semantic tools

Similar Documents

Publication Publication Date Title
Shayegani et al. Survey of vulnerabilities in large language models revealed by adversarial attacks
Venkatraman et al. Use of data visualisation for zero‐day malware detection
Nissim et al. Detection of malicious PDF files and directions for enhancements: A state-of-the art survey
Zhai et al. Text-to-image diffusion models can be easily backdoored through multimodal data poisoning
McCarthy et al. Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey
Song et al. Evaluations of AI‐based malicious PowerShell detection with feature optimizations
Shahriar et al. Effective detection of vulnerable and malicious browser extensions
Tsamados et al. The cybersecurity crisis of artificial intelligence: unrestrained adoption and natural language-based attacks
Feng et al. Android malware detection via graph representation learning
Tchakounté et al. LimonDroid: a system coupling three signature-based schemes for profiling Android malware
Chen et al. A survey of large language models for cyber threat detection
Li et al. Unveiling backdoor risks brought by foundation models in heterogeneous federated learning
Sanda et al. A deep learning approach for host-based cryptojacking malware detection
Aghamohammadi et al. Lightweight versus obfuscation-resilient malware detection in android applications
Shenderovitz et al. Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls
Masabo et al. Improvement of malware classification using hybrid feature engineering
Zhang et al. ShadowDroid: practical black-box attack against ML-based android malware detection
Huang et al. Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations
Liu et al. Smarteagleeye: A cloud-oriented webshell detection system based on dynamic gray-box and deep learning
Ali et al. Static analysis of malware in android-based platforms: a progress study
Gu et al. A novel detection technique based on benign samples and one-class algorithm for malicious PDF documents containing JavaScript
Helmer et al. Anomalous intrusion detection system for hostile Java applets
Zhang et al. Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models
Islam et al. Cyber Safety Analysis Using Reverse Engineering
Wu et al. ZTWeb: Cross site scripting detection based on zero trust