Tagged articles
143 articles
Page 2 of 2
Tencent Technical Engineering
Tencent Technical Engineering
Mar 5, 2025 · Information Security

Detecting Critical AI Infrastructure Vulnerabilities with AI-Infra-Guard

As open‑source large language model tools like Ollama, OpenWebUI and ComfyUI gain popularity, numerous security flaws such as unauthenticated APIs, CVE‑exploits, model theft and remote code execution emerge, prompting the development of AI‑Infra‑Guard—a lightweight, cross‑platform scanner that identifies over 30 component vulnerabilities and offers both web UI and CLI modes for rapid risk assessment.

AI securityAI-Infra-GuardCVE
0 likes · 13 min read
Detecting Critical AI Infrastructure Vulnerabilities with AI-Infra-Guard
Alibaba Cloud Observability
Alibaba Cloud Observability
Feb 11, 2025 · Information Security

DeepSeek Attack Reveals AI Security Risks and Cloud‑Native Observability Best Practices

The article examines DeepSeek's rapid rise and the large‑scale malicious attacks it faced, highlighting AI security vulnerabilities, and then provides a detailed, cloud‑native guide on building a comprehensive, observable security architecture on Alibaba Cloud using DDoS protection, WAF, logging, and anomaly detection.

AI securityAlibaba CloudDDoS protection
0 likes · 13 min read
DeepSeek Attack Reveals AI Security Risks and Cloud‑Native Observability Best Practices
Alibaba Cloud Native
Alibaba Cloud Native
Feb 7, 2025 · Information Security

How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability

The article examines DeepSeek’s rapid rise, the large‑scale malicious attacks it suffered, and then provides a detailed, cloud‑native security observability guide using Alibaba Cloud services such as DDoS protection, WAF, CLB, SAS, and SLS for logging, monitoring, anomaly detection, and alert response.

AI securityAlibaba CloudCloud Native
0 likes · 15 min read
How DeepSeek’s Attack Highlights the Need for Robust Cloud‑Native Security Observability
AntTech
AntTech
Jan 6, 2025 · Artificial Intelligence

2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions

This article presents sixteen peer‑reviewed research papers published in top conferences and journals in 2024, covering trusted AI, large‑model applications, network security, adversarial training, deep‑fake detection, secure inference, and related topics from collaborations among Alibaba, Tsinghua, Zhejiang, and other leading institutions.

AI securitySecure InferenceTrusted AI
0 likes · 27 min read
2024 Security and Trusted AI Research Highlights from Alibaba, Tsinghua, Zhejiang, and Partner Institutions
AntTech
AntTech
Jul 23, 2024 · Artificial Intelligence

Ant Group’s 11 Papers Accepted at ICML 2024 Cover AI Efficiency, Security, Multimodal Learning, and More

At ICML 2024 in Vienna, Ant Group had eleven papers accepted, spanning topics such as quantization-aware secure inference for transformers, multimodal contrastive captioners, self-cognitive denoising with noisy labels, directed graph embedding, GAN improvement via score matching, and trustworthy alignment of retrieval-augmented large language models.

AI securityAnt GroupICML2024
0 likes · 18 min read
Ant Group’s 11 Papers Accepted at ICML 2024 Cover AI Efficiency, Security, Multimodal Learning, and More
21CTO
21CTO
Jul 10, 2024 · Information Security

Did a Hacker Breach OpenAI’s Internal AI Discussions? Implications for Security

A New York Times report reveals that a hacker accessed OpenAI's internal messaging system, exposing employee discussions on AI advancements and sparking concerns about foreign espionage, internal security practices, and the broader national‑security implications of AI technology.

AI researchAI securityInformation Security
0 likes · 4 min read
Did a Hacker Breach OpenAI’s Internal AI Discussions? Implications for Security
OPPO Amber Lab
OPPO Amber Lab
Mar 28, 2024 · Information Security

What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum

The 2024 IEEE‑OPPO Pan‑Terminal Security Forum, held on March 29 at Xi'an Jiaotong University, gathers leading researchers to discuss AI, IoT, blockchain, and smart contract security, presenting cutting‑edge threats, defense strategies, and future technical capabilities for intelligent terminal products.

AI securityIoT securityadversarial attacks
0 likes · 10 min read
What Security Challenges Will Shape Smart AI Terminals? Insights from the 2024 IEEE‑OPPO Pan‑Terminal Security Forum
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Jan 4, 2024 · Artificial Intelligence

How to Strengthen AIGC Content Safety with Multimodal Data and Model Upgrades

The article examines the security challenges introduced by large‑model AIGC, outlines three technical upgrade paths—richer training data, few‑shot model fine‑tuning, and multimodal fusion—and demonstrates practical implementations that dramatically improve detection efficiency, accuracy, and scalability.

AI securityAIGCContent Safety
0 likes · 24 min read
How to Strengthen AIGC Content Safety with Multimodal Data and Model Upgrades
AntTech
AntTech
Nov 10, 2023 · Artificial Intelligence

Ant Group and Tsinghua University’s Distributed Collaborative Risk‑Defense System Wins Zhejiang Provincial Science & Technology Progress Award

The award‑winning distributed collaborative risk‑defense system, developed by Ant Group, Tsinghua University and Alipay, leverages AI, privacy‑preserving computing and graph analytics to achieve real‑time, high‑efficiency detection and invisible, precise control of hidden risks in massive digital transactions, earning top provincial honors and extensive industry adoption.

AI securityAwardDistributed Systems
0 likes · 5 min read
Ant Group and Tsinghua University’s Distributed Collaborative Risk‑Defense System Wins Zhejiang Provincial Science & Technology Progress Award
Baidu Geek Talk
Baidu Geek Talk
Oct 20, 2023 · Artificial Intelligence

Can Ignoring Identity Features Boost Deepfake Detection? A New Approach

This article analyzes the hidden "identity leakage" problem in deepfake detectors, proposes a novel algorithm that suppresses identity cues by focusing on local forged regions and multi‑scale facial manipulation, and demonstrates through extensive experiments that the method markedly improves generalization across unseen forgery techniques.

AI securitydeepfake detectionidentity leakage
0 likes · 13 min read
Can Ignoring Identity Features Boost Deepfake Detection? A New Approach
Efficient Ops
Efficient Ops
Sep 26, 2023 · Cloud Native

Unlocking Digital Banking: Cloud‑Native Architecture Behind Bank of China's Open Banking Success

The 2023 China International Service Trade Fair showcased a digital transformation case where Bank of China’s Open Banking platform, built on cloud‑native micro‑services, unified governance, robust security, and AI integration, demonstrated extensive industry impact, extensive partner ecosystems, and award‑winning innovation.

AI securityCloud NativeFinTech
0 likes · 10 min read
Unlocking Digital Banking: Cloud‑Native Architecture Behind Bank of China's Open Banking Success

Can Trustworthy Blockchain Federated Learning Secure AI in Wireless Networks?

This article reviews the background and challenges of data security in wireless communications, introduces Trustworthy Blockchain-based Federated Learning (TBFL), details a two‑layer TBFL architecture with edge computing, discusses its features, key technologies, and autonomous‑driving applications, and outlines current limitations and future research directions.

AI securityBlockchainWireless Networks
0 likes · 18 min read
Can Trustworthy Blockchain Federated Learning Secure AI in Wireless Networks?
OPPO Kernel Craftsman
OPPO Kernel Craftsman
Aug 1, 2023 · Information Security

What the 2023 ACM China Turing Conference Revealed About AI‑Driven Security Challenges

The 2023 ACM China Turing Conference and the ACM TURC‑OPPO Security Summit in Wuhan gathered leading researchers and industry experts to discuss AI‑powered security, Bluetooth vulnerabilities, database fuzz testing, LLM‑enhanced mobile security, and proactive privacy computing, highlighting both breakthroughs and emerging risks.

AI securityBluetooth vulnerabilitiesLLM safety
0 likes · 8 min read
What the 2023 ACM China Turing Conference Revealed About AI‑Driven Security Challenges
OPPO Amber Lab
OPPO Amber Lab
Aug 1, 2023 · Information Security

AI, Bluetooth, and Database Fuzzing: Key Insights from ACM China Turing 2023

The 2023 ACM China Turing Conference in Wuhan gathered leading experts to discuss AI‑driven security, Bluetooth protocol flaws, database fuzz testing, mobile LLM threats, and proactive privacy computing, highlighting emerging challenges and collaborative solutions for trustworthy intelligent systems.

AI securityBluetooth vulnerabilitiesdatabase fuzzing
0 likes · 7 min read
AI, Bluetooth, and Database Fuzzing: Key Insights from ACM China Turing 2023
Programmer DD
Programmer DD
Jul 26, 2023 · Information Security

WormGPT: The Dark Twin of ChatGPT Empowering Cybercriminals

WormGPT, a €60‑per‑month black‑hat AI built on GPT‑J, can generate malicious code, phishing emails and other illegal content, exposing serious security risks and prompting experts to recommend BEC training and stricter email verification to mitigate AI‑driven cyber attacks.

AI securityBEC attacksChatGPT
0 likes · 8 min read
WormGPT: The Dark Twin of ChatGPT Empowering Cybercriminals
Liangxu Linux
Liangxu Linux
Jun 20, 2023 · Information Security

How AI Hallucinations Fuel Fake NPM Package Attacks and What You Can Do

The article explains how ChatGPT's hallucinations can generate non‑existent package links that attackers register and weaponize, demonstrates the attack with a fake Node.js npm package, and offers practical steps to detect and prevent such supply‑chain threats.

AI securityChatGPT hallucinationInformation Security
0 likes · 5 min read
How AI Hallucinations Fuel Fake NPM Package Attacks and What You Can Do
Tencent Tech
Tencent Tech
Jun 6, 2023 · Information Security

How Secure Is WeChat’s Palm‑Print Payment? Inside the AI‑Powered Safeguards

WeChat’s palm‑payment combines unique palm‑texture and vein data with advanced imaging and AI algorithms to verify identity, offering large‑scale deployment, seamless user experience, and strong anti‑spoofing measures while addressing real‑world challenges like dirty or injured hands.

AI securityImage Processingbiometric authentication
0 likes · 7 min read
How Secure Is WeChat’s Palm‑Print Payment? Inside the AI‑Powered Safeguards
OPPO Amber Lab
OPPO Amber Lab
Jun 5, 2023 · Information Security

How ChatGPT Impacts Security: Key Insights from the CSA Seminar

An online CSA seminar on May 30 examined ChatGPT’s security impact, presenting a whitepaper and four AI‑security interaction dimensions, while experts discussed telecom‑operator security‑GPT models, safe vertical‑domain large‑model training, and future industry implications.

AI GovernanceAI securityChatGPT
0 likes · 7 min read
How ChatGPT Impacts Security: Key Insights from the CSA Seminar
OPPO Amber Lab
OPPO Amber Lab
Apr 25, 2023 · Artificial Intelligence

Exploring AI Security Frontiers at the 12th Wu Wenjun AI Science & Technology Awards

The 12th Wu Wenjun Artificial Intelligence Science & Technology Awards and 2022 China AI Industry Conference, held in Beijing and Suzhou, gathered leading scholars and industry experts to discuss AI security challenges, deepfake defenses, data‑free trojan detection, and the latest advances in trustworthy AI across six insightful sessions.

AI ConferenceAI securityWu Wenjun award
0 likes · 13 min read
Exploring AI Security Frontiers at the 12th Wu Wenjun AI Science & Technology Awards
Programmer DD
Programmer DD
Apr 12, 2023 · Information Security

OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI

OpenAI announced a new Bug Bounty Program offering up to $20,000 for verified vulnerabilities, inviting global security researchers to help secure its AI models while outlining clear rules, out‑of‑scope exclusions, and a partnership with Bugcrowd for reward management.

AI securityBug BountyBugcrowd
0 likes · 7 min read
OpenAI Launches $20K Bug Bounty: How Researchers Can Secure AI
IT Services Circle
IT Services Circle
Feb 24, 2023 · Information Security

The Dark Side of ChatGPT: Scams, Prompt Injection, and Security Risks

The article examines how the rapid popularity of ChatGPT has spurred both legitimate opportunities and a surge in illicit activities, including account resale, scam scripts generated via prompt injection, and the creation of malware, highlighting the need for stricter regulation and security awareness.

AI misuseAI securityChatGPT
0 likes · 6 min read
The Dark Side of ChatGPT: Scams, Prompt Injection, and Security Risks
DataFunSummit
DataFunSummit
Nov 13, 2022 · Blockchain

A Blockchain‑Based Trusted Federated Learning Architecture: Overview, Progress, and Future Directions

This article presents a comprehensive overview of blockchain‑enabled trusted federated learning, covering privacy computing fundamentals, legal standards, technical classifications, real‑world use cases, the CMFL decentralized framework with committee consensus, experimental results, and future research opportunities.

AI securitydecentralized architecture
0 likes · 19 min read
A Blockchain‑Based Trusted Federated Learning Architecture: Overview, Progress, and Future Directions
DataFunSummit
DataFunSummit
Jan 26, 2022 · Artificial Intelligence

Applying Graph Neural Networks for Early Fraud Warning and Malicious URL Detection

This article explains how Tencent's security data lab uses graph neural networks to build heterogeneous temporal graphs for early warning of water‑room fraud cards and to detect malicious URLs, detailing the data modeling, graph construction, attention‑based aggregation, model training, and evaluation results.

AI securityMalicious URL Detectionheterogeneous graph
0 likes · 8 min read
Applying Graph Neural Networks for Early Fraud Warning and Malicious URL Detection
AntTech
AntTech
Dec 16, 2021 · Information Security

CNCC2021 Technical Forum – Security Challenges in Digital Transformation

CNCC2021’s technical forum, held on December 17, 2021, gathered leading academics and industry experts to discuss privacy computing, secure multiparty computation, AI-driven cybersecurity, single sign‑on privacy, Yao’s garbled circuits, and blockchain smart‑contract security, highlighting emerging risks and solutions for digital transformation.

AI securityDigital TransformationPrivacy Computing
0 likes · 11 min read
CNCC2021 Technical Forum – Security Challenges in Digital Transformation
OPPO Amber Lab
OPPO Amber Lab
Nov 1, 2021 · Information Security

AI-Enabled Security Insights from the 2021 Pan-Terminal Workshop

The 2021 Pan‑Terminal Security Workshop, jointly organized by the China Computer Federation and OPPO at Xi'an Jiaotong University, gathered leading academics and industry experts to discuss AI‑driven security, kernel protection, and blockchain finance, offering livestream access and video recordings for the research community.

AI securityBlockchainInformation Security
0 likes · 3 min read
AI-Enabled Security Insights from the 2021 Pan-Terminal Workshop
DataFunTalk
DataFunTalk
Oct 24, 2021 · Artificial Intelligence

Privacy Computing: The Federated Three‑Stage FIRM Architecture and Its Industrial Applications

This article introduces the background of privacy computing, explains the FIRM (Federated system Interconnection Reference Model) three‑stage architecture, details key technologies such as the Ionic Bond communication framework and HeteroDeepFM, and showcases real‑world applications in marketing, risk control, and government sectors.

AI securityData CollaborationFIRM architecture
0 likes · 15 min read
Privacy Computing: The Federated Three‑Stage FIRM Architecture and Its Industrial Applications
DataFunSummit
DataFunSummit
Oct 23, 2021 · Artificial Intelligence

Privacy Computing: The Federated Learning Three‑Part FIRM Architecture and Its Industrial Applications

This article introduces the background of privacy computing, explains the three‑stage FIRM reference architecture for federated learning, describes key technologies such as the Ionic Bond communication framework and HeteroDeepFM, and showcases real‑world applications in marketing, risk control, and government sectors.

AI securityData CollaborationFIRM architecture
0 likes · 17 min read
Privacy Computing: The Federated Learning Three‑Part FIRM Architecture and Its Industrial Applications
NetEase Smart Enterprise Tech+
NetEase Smart Enterprise Tech+
Sep 2, 2021 · Artificial Intelligence

How AI Detects Video Deepfakes: Techniques, Challenges, and Real-World Solutions

This article explores the rapid rise of AI‑generated video deepfakes, examines the four main manipulation techniques, discusses the inherent security risks, and presents NetEase Yidun’s comprehensive detection framework—including face‑detection‑based classification, semi‑supervised learning, feature fusion, and model distillation—to combat content‑security threats.

AI securityComputer VisionSemi-supervised Learning
0 likes · 12 min read
How AI Detects Video Deepfakes: Techniques, Challenges, and Real-World Solutions
Infra Learning Club
Infra Learning Club
May 19, 2021 · Cloud Computing

Why Distributed Cloud Is a Top 2020 Strategic Technology Trend

The article analyzes distributed cloud as a breakthrough cloud model that defines service location, bridges gaps in hybrid cloud, evolves through four phases, and underpins emerging use cases such as edge, blockchain, and AI security, offering enterprise architects strategic guidance for 2024 and beyond.

AI securityBlockchainEdge Computing
0 likes · 21 min read
Why Distributed Cloud Is a Top 2020 Strategic Technology Trend
Tencent Tech
Tencent Tech
May 13, 2021 · Artificial Intelligence

Seeing Inside the Black Box: Visualizing Neural Network Training and Adversarial Threats

This article explains how neural networks work, walks through the step‑by‑step training process of a convolutional model, showcases vivid visualizations of each layer, and demonstrates how tiny adversarial perturbations can dramatically alter predictions, highlighting the importance of AI security.

AI securityCNN visualizationDeep Learning
0 likes · 6 min read
Seeing Inside the Black Box: Visualizing Neural Network Training and Adversarial Threats
Kuaishou Tech
Kuaishou Tech
Apr 6, 2021 · Artificial Intelligence

Frequency-Aware Feature Learning with Single-Center Loss for Face Forgery Detection

Researchers from USTC and Kuaishou propose a frequency‑aware feature learning framework that combines a data‑driven adaptive frequency module with a novel single‑center loss, achieving state‑of‑the‑art performance on deepfake detection while addressing class‑distribution challenges.

AI securityComputer Visiondeepfake detection
0 likes · 7 min read
Frequency-Aware Feature Learning with Single-Center Loss for Face Forgery Detection
Architects Research Society
Architects Research Society
Nov 29, 2020 · Information Security

AI and Machine Learning Threats to Autonomous Vehicles and Drones: Security Risks and Attack Vectors

A UN, Interpol and Trend Micro report warns that cyber criminals can exploit artificial intelligence and machine learning to launch attacks on autonomous cars, drones and IoT vehicles, potentially causing physical harm, traffic disruption, and data theft, highlighting urgent security challenges for emerging technologies.

AI securityIoT threatsautonomous vehicles
0 likes · 5 min read
AI and Machine Learning Threats to Autonomous Vehicles and Drones: Security Risks and Attack Vectors
Tencent Tech
Tencent Tech
Sep 25, 2020 · Artificial Intelligence

What’s Inside Tencent’s AI Security Attack Matrix? A Minefield Guide

Tencent’s AI Security Attack Matrix, the industry’s first AI‑focused risk framework, maps attack tactics, techniques, and processes across the AI lifecycle, offering practical guidance for researchers and developers to identify and mitigate security threats in AI systems.

AI SafetyAI securityTencent
0 likes · 5 min read
What’s Inside Tencent’s AI Security Attack Matrix? A Minefield Guide
AntTech
AntTech
Aug 18, 2020 · Artificial Intelligence

Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience

The article compares shared intelligence and federated learning, examines privacy‑preserving techniques such as MPC, TEE, and differential privacy, discusses gradient‑inversion attacks and their mitigations, and presents Ant Group’s end‑to‑end system design and real‑world deployments in finance.

AI securityAnt GroupFederated Learning
0 likes · 22 min read
Shared Intelligence vs. Federated Learning: Techniques, Challenges, and Ant Group’s Practical Experience
AntTech
AntTech
Jun 2, 2020 · Artificial Intelligence

Privacy-Preserving Machine Learning Workshop at CCS 2020 (Ant Shared Intelligence)

The Ant Shared Intelligence workshop at ACM CCS 2020 invites researchers and practitioners to submit short papers on privacy‑preserving machine learning techniques such as secure multi‑party computation, homomorphic encryption, differential privacy, federated learning, and related applications, with a submission deadline of June 21, 2020.

AI securityCCS2020Federated Learning
0 likes · 5 min read
Privacy-Preserving Machine Learning Workshop at CCS 2020 (Ant Shared Intelligence)
Alibaba Cloud Developer
Alibaba Cloud Developer
Mar 11, 2019 · Artificial Intelligence

How Adversarial Attacks Threaten AI: Real-World Cases & Alibaba’s Defense

AI brings convenience but also new security challenges; this article explains the two main sources of AI safety issues, details adversarial example techniques, showcases applications such as face‑recognition attacks and robust captcha designs, and highlights Alibaba’s research and the IJCAI‑19 AI adversarial competition.

AI securityCaptchaadversarial examples
0 likes · 8 min read
How Adversarial Attacks Threaten AI: Real-World Cases & Alibaba’s Defense
JD Tech
JD Tech
Dec 10, 2018 · Information Security

Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe

JD Security’s Silicon Valley AI security scientist unveiled a novel container‑based sandbox at BlackHat Europe, detailing how contextual behavior analysis can detect and trace malicious code by leveraging lightweight containers, improving threat detection speed and accuracy for enterprise defenses.

AI securityContainer SecurityInformation Security
0 likes · 6 min read
Container Sandbox for Contextual Behavior Analysis Presented at BlackHat Europe
AntTech
AntTech
Nov 1, 2018 · Artificial Intelligence

Heterogeneous Graph Neural Networks for Malicious Account Detection (GEM) – Overview of Ant Financial’s CIKM 2018 Paper

This article introduces the GEM method, the first heterogeneous graph neural network designed for malicious account detection, explains the nature and characteristics of malicious accounts, describes why graph neural networks are effective, and presents experimental results from the authors' CIKM 2018 study.

AI securityCIKM 2018financial fraud
0 likes · 8 min read
Heterogeneous Graph Neural Networks for Malicious Account Detection (GEM) – Overview of Ant Financial’s CIKM 2018 Paper
JD Tech
JD Tech
Sep 7, 2018 · Information Security

Big Data and AI Security Insights from ISC 2018 Conference

The ISC 2018 conference highlighted the growing importance of big data and artificial intelligence security, presenting JD's research on anti‑scraping techniques, AI‑driven defenses against black‑market attacks, and a service‑oriented approach to protecting user data across enterprises.

AI securityBig DataInformation Security
0 likes · 5 min read
Big Data and AI Security Insights from ISC 2018 Conference
JD Tech
JD Tech
Aug 20, 2018 · Artificial Intelligence

Understanding AI Black‑Box Risks and Security: From Adversarial Samples to JD's Explainable AI Solution

The article explains how the black‑box nature of deep learning creates security risks such as adversarial attacks, describes real‑world examples in autonomous driving and medical imaging, and showcases JD Security's explainable AI system that demystifies model decisions to improve AI safety and industry adoption.

AI securityDeep LearningJD Security
0 likes · 11 min read
Understanding AI Black‑Box Risks and Security: From Adversarial Samples to JD's Explainable AI Solution