IEEE.org
IEEE CS Standards
Career Center
About Us
Subscribe to Newsletter
0
Sign In
Generative AI for security. This special issue is highly interested in the development of new AI-based attacks and defenses that use generative AI as a tool to improve/evaluate the security of systems. Potential topics include generative AI and malware analysis, generative AI and code generation, and generative AI and cryptography.
Security of generative AI. This special issue looks forward to featuring papers that concentrate on the security of generative AI. Within this topic, we are interested in all flavors and input data types (images, text, sound, etc.) commonly used in generative AI. Possible topics of interest include adversarial examples, poisoning attacks, and centralized and decentralized settings.
We invite submissions that extend and challenge current knowledge about the intersection of generative AI and security.
Suggested topics include, but are not limited to:
Implementation attacks and generative AI
Malware analysis and generative AI
Security benchmarking of generative AI (LLMs)
Code generation, code line anomalies, and bug fixes with generative AI
Hardware design with generative AI
Watermarking and copyright protection of generative AI
Adversarial examples
Poisoning attacks
Privacy of generative AI
Jailbreaking attacks
Prompt injection and stealing attacks
Sponge attacks
Federated and decentralized learning
Explainable AI (XAI)
Safety of AI agents
Toxicity and harmfulness of AI-generated content
Detection of Deepfakes
Red-teaming of generative AI (LLMs)
Fairness and machine interpretability
Submission Guidelines
For author information and submission criteria for full papers, please visit the
Author Information
page. As stated there, full papers should be 4900 – 7200 words in length. Please submit full papers through the
IEEE Author Portal
system, and be sure to select the special-issue name. Manuscripts should not be published or currently submitted for publication elsewhere. There should be no more than 15 references. Related work should appear in a special separated box. Please submit only full papers intended for peer review, not opinion pieces, to the
IEEE Author Portal
.
Questions?
Contact the guest editors at
sp5-25@computer.org
.
Stjepan Picek, Radboud University, The Netherlands
Lorenzo Cavallaro, University College London, UK
Jason Xue, CSIRO’s Data61, Australia
LATEST NEWS