{"id":3745,"date":"2023-09-05T05:24:00","date_gmt":"2023-09-04T20:24:00","guid":{"rendered":"https:\/\/devneko.jp\/wordpress\/?p=3745"},"modified":"2023-09-05T05:24:00","modified_gmt":"2023-09-04T20:24:00","slug":"identifying-and-mitigating-the-security-risks-of-generative-ai","status":"publish","type":"post","link":"https:\/\/devneko.jp\/wordpress\/?p=3745","title":{"rendered":"Identifying and Mitigating the Security Risks of Generative AI"},"content":{"rendered":"\n<ul class=\"wp-block-list\">\n<li><strong>Identifying and Mitigating the Security Risks of Generative AI&nbsp;<\/strong>[179.2]<br>\u672c\u7a3f\u3067\u306f,GenAI\u306b\u3088\u308b\u30b8\u30ec\u30f3\u30de\u306b\u95a2\u3059\u308bGoogle\u306e\u30ef\u30fc\u30af\u30b7\u30e7\u30c3\u30d7\u306e\u6210\u679c\u3092\u5831\u544a\u3059\u308b\u3002 GenAI\u306f\u307e\u305f\u3001\u653b\u6483\u8005\u304c\u65b0\u3057\u3044\u653b\u6483\u3092\u751f\u6210\u3057\u3001\u65e2\u5b58\u306e\u653b\u6483\u306e\u30d9\u30ed\u30b7\u30c6\u30a3\u3068\u6709\u52b9\u6027\u3092\u9ad8\u3081\u308b\u305f\u3081\u306b\u3082\u4f7f\u7528\u3067\u304d\u308b\u3002 \u3053\u306e\u8a71\u984c\u306b\u3064\u3044\u3066,\u30b3\u30df\u30e5\u30cb\u30c6\u30a3\u306e\u77ed\u671f\u7684,\u9577\u671f\u7684\u76ee\u6a19\u306b\u3064\u3044\u3066\u8ad6\u3058\u308b\u3002<br><a href=\"http:\/\/arxiv.org\/abs\/2308.14840v1\">\u8ad6\u6587<\/a>&nbsp;&nbsp;<a href=\"https:\/\/fugumt.com\/fugumt\/paper_check\/2308.14840v1\">\u53c2\u8003\u8a33\uff08\u30e1\u30bf\u30c7\u30fc\u30bf\uff09<\/a>&nbsp; &nbsp;(Mon, 28 Aug 2023 18:51:09 GMT)<\/li>\n\n\n\n<li>LLM\u306a\u3069\u751f\u6210AI\u3092\u4f7f\u3063\u305f\u653b\u6483\u3068\u9632\u5fa1\u306b\u95a2\u3057\u3066\u6574\u7406\u3057\u305f\u8ad6\u6587\u3002Capability, Attack, Defence\u3068\u6574\u7406\u3055\u308c\u3066\u3044\u308b\u3002Attack\u306e\u3068\u3053\u308d\u3067\u306fSpear-phishing\u3001Hallucinations\u3001Dissemination of deepfakes\u3001Proliferation of cyberattacks\u3001Low barrier-of-entry for adversaries\u3001Lack of social awareness and human sensibility\u3001&nbsp;Data feedback loops\u3001Unpredictability\u304c\u6319\u3052\u3089\u308c\u3066\u3044\u308b\u3002Unpredictability\u306b\u300cCurrently, we remain unaware of the full range of capabilities and threats posed by GenAI models.\u300d\u3068\u3042\u308b\u306e\u304c\u8208\u5473\u6df1\u3044\u3002<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[168,223,622],"class_list":["post-3745","post","type-post","status-publish","format-standard","hentry","category-arxiv","tag-generative-ai","tag-llm","tag-622"],"_links":{"self":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/3745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=3745"}],"version-history":[{"count":0,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=\/wp\/v2\/posts\/3745\/revisions"}],"wp:attachment":[{"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=3745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=3745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/devneko.jp\/wordpress\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=3745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}