IFS-P13: LLM Security, Jailbreaks & Prompt Injection
Poster
Thu, 7 May, 14:00 - 16:00
Location: Poster Area 23
Session Type: Poster
Track: Information Forensics and Security [IF]
Click the to view the manuscript on IEEE Xplore Open Preview

IFS-P13.1: CP-GUARD: CONTINUAL PREFERENCE ALIGNMENT FOR COPYRIGHT PROTECTION

Min Gou, University of Electronic Science and Technology of China, China; Zhiyu Yao, Hualong Ma, Qiyuan Lab, China; Siyu Zhan, University of Electronic Science and Technology of China, China; Fei He, Tsinghua University, China

IFS-P13.2: ROBUST IN-CONTEXT DEFENSES AGAINST JAILBREAKING OF LLMS VIA ROLE SPECIFICATION

Yuki Wakai, Kyoto University, Japan; Kunihiro Ito, NEC Corporation, Japan; Hisashi Kashima, Kyoto University, Japan

IFS-P13.3: IPI²: Mitigating Indirect Prompt Injections on Unmanned Aerial Vehicle Agents Using Physical Invariants

Qidi Zhong, Siyang Liu, Jiani Liu, Kaikai Pan, Yushi Cheng, Wenyuan Xu, Zhejiang University, China

IFS-P13.4: RADI: A RETRIEVAL-AUGMENTED DYNAMIC IN-CONTEXT LEARNING FRAMEWORK FOR AIGC IMAGE DETECTION

Tengwei Bi, Ruiji Ma, Ying Huang, Yihan Wang, Jie Liu, Shuwu Zhang, Beijing University of Posts and Telecommunications, China

IFS-P13.5: TALPS: A FRAMEWORK FOR ADAPTIVE LEARNING OF TACTICS, TECHNIQUES, AND PROCEDURES CLASSIFICATION WITH LARGE LANGUAGE MODELS

Jiayu Zhang, Yu Qiao, Tianheng Qu, Haiqiang Fei, Hongsong Zhu, Institute of Information Engineering, Chinese Academy of Sciences, China

IFS-P13.6: AUDITGPT: A MULTI-AGENT FRAMEWORK FOR ENHANCING STATIC ANALYSIS

Junze Hu, Yizhe Zeng, Guoli Zhao, Kaiyu Xie, Yimo Ren, Dahui Li, Hongsong Zhu, Institute of Information Engineering, China

IFS-P13.7: LLM-Guided Hierarchical Reinforcement Learning for Black-Box Adversarial Attacks Against Malware Detectors

Xinyi Liu, Aimin Yu, Haichao Du, Qingjia Huang, Jing Tang, Yamin Xie, Institute of Information Engineering Chinese Academy of Sciences, China

IFS-P13.8: PassMoE-P: Enhancing Password Guessing Using Large Language Models with Pattern-Specialized Mixture-of-Experts

Beilei Zhang, Yuke Ma, Tao Hu, Yanzhao Gao, Hongtao Yu, Fan Zhang, Hailong Ma, Information Engineering University, China

IFS-P13.9: IR-HUNTER: AUTOMATED ANALYSIS OF INTENT REDIRECTION VULNERABILITIES IN ANDROID APPLICATIONS BASED ON HYBRID DYNAMIC AND STATIC APPROACHES

Yue Jiang, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China; Xiaobo Xiang, Singular Security Lab, Beijing, China, China; Hao Tang, Qi Gong, Xiaorui Gong, Institute of Information Engineering, Chinese Academy of Sciences, Beijing, China, China

IFS-P13.10: NEURERASE: SELECTIVE DEACTIVATION OF NEURONS FOR ERASING CONCEPTS IN DIFFUSION MODELS

Ziyuan Chen, Yueming Lyu, Nanjing University, China; Zheling Meng, Institute of Automation, Chinese Academy of Sciences, China; Haoxiang Rao, Nanjing University, China; Ning Li, China Mobile Information Technology Co., Ltd., China; Songping Wang, Caifeng Shan, Nanjing University, China