Tsamados et al., 2023 - Google Patents
The cybersecurity crisis of artificial intelligence: unrestrained adoption and natural language-based attacksTsamados et al., 2023
View PDF- Document ID
- 12415739128182415465
- Author
- Tsamados A
- Floridi L
- Taddeo M
- Publication year
- Publication venue
- arXiv preprint arXiv:2311.09224
External Links
Snippet
The widespread integration of autoregressive-large language models (AR-LLMs), such as ChatGPT, across established applications, like search engines, has introduced critical vulnerabilities with uniquely scalable characteristics. In this commentary, we analyse these …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30634—Querying
- G06F17/30657—Query processing
- G06F17/30675—Query execution
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30613—Indexing
- G06F17/30619—Indexing indexing structures
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F17/00—Digital computing or data processing equipment or methods, specially adapted for specific functions
- G06F17/30—Information retrieval; Database structures therefor; File system structures therefor
- G06F17/3061—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F17/30731—Creation of semantic tools
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Shayegani et al. | Survey of vulnerabilities in large language models revealed by adversarial attacks | |
Venkatraman et al. | Use of data visualisation for zero‐day malware detection | |
Nissim et al. | Detection of malicious PDF files and directions for enhancements: A state-of-the art survey | |
Zhai et al. | Text-to-image diffusion models can be easily backdoored through multimodal data poisoning | |
McCarthy et al. | Functionality-preserving adversarial machine learning for robust classification in cybersecurity and intrusion detection domains: A survey | |
Song et al. | Evaluations of AI‐based malicious PowerShell detection with feature optimizations | |
Shahriar et al. | Effective detection of vulnerable and malicious browser extensions | |
Tsamados et al. | The cybersecurity crisis of artificial intelligence: unrestrained adoption and natural language-based attacks | |
Feng et al. | Android malware detection via graph representation learning | |
Tchakounté et al. | LimonDroid: a system coupling three signature-based schemes for profiling Android malware | |
Chen et al. | A survey of large language models for cyber threat detection | |
Li et al. | Unveiling backdoor risks brought by foundation models in heterogeneous federated learning | |
Sanda et al. | A deep learning approach for host-based cryptojacking malware detection | |
Aghamohammadi et al. | Lightweight versus obfuscation-resilient malware detection in android applications | |
Shenderovitz et al. | Bon-APT: Detection, attribution, and explainability of APT malware using temporal segmentation of API calls | |
Masabo et al. | Improvement of malware classification using hybrid feature engineering | |
Zhang et al. | ShadowDroid: practical black-box attack against ML-based android malware detection | |
Huang et al. | Lifting the Veil on the Large Language Model Supply Chain: Composition, Risks, and Mitigations | |
Liu et al. | Smarteagleeye: A cloud-oriented webshell detection system based on dynamic gray-box and deep learning | |
Ali et al. | Static analysis of malware in android-based platforms: a progress study | |
Gu et al. | A novel detection technique based on benign samples and one-class algorithm for malicious PDF documents containing JavaScript | |
Helmer et al. | Anomalous intrusion detection system for hostile Java applets | |
Zhang et al. | Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models | |
Islam et al. | Cyber Safety Analysis Using Reverse Engineering | |
Wu et al. | ZTWeb: Cross site scripting detection based on zero trust |