Skip to main content

Showing 1–5 of 5 results for author: Mathys, M

.
  1. arXiv:2501.07927  [pdf, other

    cs.LG cs.AI cs.CL cs.CR

    Gandalf the Red: Adaptive Security for LLMs

    Authors: Niklas Pfister, Václav Volhejn, Manuel Knott, Santiago Arias, Julia Bazińska, Mykhailo Bichurin, Alan Commike, Janet Darling, Peter Dienes, Matthew Fiedler, David Haber, Matthias Kraft, Marco Lancini, Max Mathys, Damián Pascual-Ortiz, Jakub Podolak, Adrià Romero-López, Kyriacos Shiarlis, Andreas Signer, Zsolt Terek, Athanasios Theocharis, Daniel Timbrell, Samuel Trautwein, Samuel Watts, Yun-Han Wu , et al. (1 additional authors not shown)

    Abstract: Current evaluations of defenses against prompt attacks in large language model (LLM) applications often overlook two critical factors: the dynamic nature of adversarial behavior and the usability penalties imposed on legitimate users by restrictive defenses. We propose D-SEC (Dynamic Security Utility Threat Model), which explicitly separates attackers from legitimate users, models multi-step inter… ▽ More

    Submitted 2 February, 2025; v1 submitted 14 January, 2025; originally announced January 2025.

    Comments: Niklas Pfister, Václav Volhejn and Manuel Knott contributed equally

  2. arXiv:2408.06398  [pdf, other

    cs.CY cs.CV

    Synthetic Photography Detection: A Visual Guidance for Identifying Synthetic Images Created by AI

    Authors: Melanie Mathys, Marco Willi, Raphael Meier

    Abstract: Artificial Intelligence (AI) tools have become incredibly powerful in generating synthetic images. Of particular concern are generated images that resemble photographs as they aspire to represent real world events. Synthetic photographs may be used maliciously by a broad range of threat actors, from scammers to nation-state actors, to deceive, defraud, and mislead people. Mitigating this threat us… ▽ More

    Submitted 12 August, 2024; originally announced August 2024.

    Comments: 27 pages, 25 figures

    ACM Class: K.4.0; I.2.0; I.4.0

  3. arXiv:2403.12207  [pdf, other

    cs.CY cs.AI cs.CV

    Synthetic Image Generation in Cyber Influence Operations: An Emergent Threat?

    Authors: Melanie Mathys, Marco Willi, Michael Graber, Raphael Meier

    Abstract: The evolution of artificial intelligence (AI) has catalyzed a transformation in digital content generation, with profound implications for cyber influence operations. This report delves into the potential and limitations of generative deep learning models, such as diffusion models, in fabricating convincing synthetic images. We critically assess the accessibility, practicality, and output quality… ▽ More

    Submitted 18 March, 2024; originally announced March 2024.

    Comments: 44 pages, 56 figures

    ACM Class: K.4.0; I.2.0; I.4.0

  4. arXiv:2206.06761  [pdf, other

    cs.CV cs.AI

    Exploring Adversarial Attacks and Defenses in Vision Transformers trained with DINO

    Authors: Javier Rando, Nasib Naimi, Thomas Baumann, Max Mathys

    Abstract: This work conducts the first analysis on the robustness against adversarial attacks on self-supervised Vision Transformers trained using DINO. First, we evaluate whether features learned through self-supervision are more robust to adversarial attacks than those emerging from supervised learning. Then, we present properties arising for attacks in the latent space. Finally, we evaluate whether three… ▽ More

    Submitted 8 September, 2022; v1 submitted 14 June, 2022; originally announced June 2022.

    Comments: ICML 2022 Workshop paper accepted at AdvML Frontiers

  5. arXiv:2108.05236  [pdf, other

    cs.DC

    A Limitlessly Scalable Transaction System

    Authors: Max Mathys, Roland Schmid, Jakub Sliwinski, Roger Wattenhofer

    Abstract: We present Accept, a simple, asynchronous transaction system that achieves perfect horizontal scaling. Usual blockchain-based transaction systems come with a fundamental throughput limitation as they require that all (potentially unrelated) transactions must be totally ordered. Such solutions thus require serious compromises or are outright unsuitable for large-scale applications, such as global… ▽ More

    Submitted 11 August, 2021; originally announced August 2021.

    Comments: 11 pages, 3 figures