This is an old revision of the document!
Overview
Title: Special Topics on AI Security
Provided by: Dept. of Computer Engineering, Myongji University
Lead by: Minho Shin (mhshin@mju.ac.kr, Rm5736)
Period: Spring semester, 2026
Location: 5701 at 5th Engineering Building
Time: Wed, 10am to 1pm
Type: Graduate Seminar
Goal of the class
This class aims to familiarize students with current research topics in AI Security & Privacy area
This class also aims to train students with their communication skills including oral presentation, discussion, writing, and collaboration
-
Participants
| # | Name | Dept | Advisor | Email Address |
| 1 | Hyeonjun Jo | CE | Undergraduate | mnbvjojun@gmail.com |
| 2 | Nayung Kwak | CE | Undergraduate | kny12202423@gmail.com |
| 3 | Kyungchan Kim | CS | Minho Shin | kkc8983@gmail.com |
Agenda
TBD
* order: Cho --> Han --> Kwak
* # of presentations per week: 2, 2, 2, ...
* # of presentations per person:
| Date | Name | Topic | Slides | Minutes |
| 3/4 | Minho | Ice-breaking | AI-Cybersecurity | Survey paper |
| 3/11 | Minho | | | |
| Cho | https://www.usenix.org/system/files/sec21-schuster.pdf | | |
| 9/17 | No Class | | | |
| 9/24 | Jung | | | |
| Zang | | | |
| Chang | | | |
| Sang | | | |
| 10/1 | Jung | | | |
| Zang | | | |
| Chang –> Sang | | | |
| 10/8 | No Class | | | |
| 10/15 | Sang –> Chang | | | |
| Jung | | | |
| Zang | | | |
| 10/22 | Chang | | | |
| Sang | | | |
| 10/29 | No Class | | | |
| 11/5 | Jung | | | |
| Zang | | | |
| Chang | | | |
| 11/12 | No Class | | | |
| 11/19 | Sang | | | |
| Jung | | | |
| Zang | | | |
| 11/26 | Jung | | | |
| Sang | | | |
| Chang | | | |
| 12/3 | Zang | | | |
| Chang –> Jung | | | |
| Sang | | | |
| 12/10 | Jung –> Chang | | | |
| Zang | | | |
Rules for the class
We have 15 presentations in total by three students
Each present 5 presentations throughout the semester
One presentation per day
The presenter announces the paper to present at least one week ahead
The presenter prepares a powerpoint slides for 30-60min talk
The other students submit a review article (1-2 pages) before class
The presentation should contain:
(Motivation) What are the motivations for this particular problem? What is the backgrounds for understanding the problem? Why is this important?
(Problem) What is, on earth, the exact problem the authors aim to address, and why on earth, is the problem important?
(Related work) What has been done by other researchers to address the same or similar problem on the table? Why the existing work is not enough to call done?
(Method) What is their main methodology to address the problem? How did they actually solve the problem in detail?
(Evaluation) What are the evidences for their success found in the paper? What is missing in their evaluation?
(Contribution) What is the contribution of the paper and what is not their contributions? Are there any limitations in their result? How would you evaluate the value of the paper?
(Future work) What is the remaining problems that were only partially addressed or never covered by the paper? What will be a possible approach to the problem?
A review article contains
The same content as described for the presenter
But in a succinctly written words form
Not exceeding two pages
Submit in Word/PDF by email
Evaluation
Reading List for LLM-based Cybersecurity
Intrusion Detection
(Changyeol) Yin et al. [55]: "A deep learning approach for intrusion detection using recurrent neural networks." This paper proposes a deep learning model called RNN-ID and evaluates its performance in binary and multiclass classification tasks for intrusion detection.
(Sangbin) Xu et al. [58]: "An intrusion detection system using a deep neural network with gated recurrent units." This paper proposes a novel IDS that uses a recurrent neural network with GRUs, an MLP, and a softmax module.
Ferrag and Leandros [59]: "Deepcoin: A novel deep learning and blockchain-based energy exchange framework for smart grids." This paper proposes a framework that uses a deep learning-based scheme employing RNNs to detect network attacks and fraudulent transactions.
(Sehyeon) Chawla et al. [60]: "Host based intrusion detection system with combined cnn/rnn model." The authors present an anomaly-based IDS that leverages RNNs with GRUs and stacked CNNs to detect malicious cyberattacks.
Ullah et al. [61]: "Design and development of rnn anomaly detection model for iot networks." This work introduces deep learning models using RNNs, CNNs, and hybrid techniques for anomaly detection in IoT networks.
(Sohyeon) Donkol et al. [62]: "Optimization of intrusion detection using likely point pso and enhanced lstm-rnn hybrid technique in communication networks." This paper presents ELSTM-RNN, a technique to improve security in IDSs by using an enhanced LSTM framework combined with an optimization technique.
Zhao et al. [63]: "Ernn: Error-resilient run for encrypted traffic detection towards network-induced phenomena." This paper presents ERNN, an end-to-end RNN model with a novel session gate, designed to address network-induced phenomena that can lead to misclassifications in traffic detection systems.
Polat et al. [65]: "A novel approach for accurate detection of the ddos attacks in sdn-based scada systems based on deep recurrent neural networks." This paper introduces a method for improving DDoS attack detection in SDN-based SCADA systems using an RNN classifier model with parallel LSTM and GRU methods.
(Sehyeon) Althubiti et al. [57]: "Applying long short-term memory recurrent neural network for intrusion detection." The authors propose a deep learning-based Detection System IDS using an LSTM RNN to classify and predict known and unknown intrusions.
Software Security
Malware Classification
(Sohyeon) Ziems et al. [67]: This study explores transformer-based models for malware classification using
API call sequences as features.
Demirkıran et al. [69]: This paper proposes using transformer-based models for classifying malware families, demonstrating that they are better suited for capturing sequence relationships among
API calls than traditional models.
Blockchain Security
Cyber Threat Intelligence
Hashemi et al. [76]: The authors propose an alternative approach for automated vulnerability information extraction from vulnerability descriptions using Transformer models like BERT, XLNet, and RoBERTa.
Karlsen et al. [87] proposed the LLM4Sec framework, which benchmarks fine-tuned models for cybersecurity log analysis, with DistilRoBERTa achieving an exceptional F1-score of 0.998 across diverse datasets.
Phishing Detection and Response
(Sohyeon) Jamal et al. [25]: "An improved transformer-based model for detecting phishing, spam and ham emails: A large language model approach." This paper proposes IPSDM, a fine-tuned model based on the BERT family, to address the growing sophistication of phishing and spam attacks.
Detection of Deepfake Videos
Reading List for LLM Vulnerability
Prompt Injection
Automatic Adversarial Prompt Generation
Zou et al. [201]: "Universal and transferable adversarial attacks on aligned language models." This paper proposes a method for automatically generating adversarial prompts in aligned language models by crafting a targeted suffix that, when appended to LLM queries, maximizes the likelihood of producing objectionable or undesirable content.
Adversarial Natural Language Instructions
Wu et al. [199]: This paper introduces "DeceptPrompt," a novel algorithm that can generate adversarial natural language instructions that drive Code LLMs to produce functionally correct code with hidden vulnerabilities. The algorithm uses a systematic evolution-based methodology with a fine-grained loss design to craft deceptive prompts.
Data Poisoning
He et al. [205]: "Talk too much: Poisoning large language models under token limit". This paper details an attack that subtly alters input data to trigger malicious behaviors in a model based on conditional output limitations.
(changyeol) Jiaming He1,2, Wenbo Jiang" : "Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models".
class/gradsec2026.1773199952.txt.gz · Last modified: 2026/03/11 10:32 by
jhj2004 · [
Old revisions]