{"id":241,"date":"2025-12-26T19:57:03","date_gmt":"2025-12-26T10:57:03","guid":{"rendered":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/?page_id=241"},"modified":"2026-01-08T22:56:07","modified_gmt":"2026-01-08T13:56:07","slug":"int3","status":"publish","type":"page","link":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/int3\/","title":{"rendered":"\u7b2c3\u56desig-sec\u56fd\u969b\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0"},"content":{"rendered":"<p style=\"font-weight: 400\">\u4eba\u5de5\u77e5\u80fd\u5b66\u4f1a\u5b89\u5168\u6027\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a(SIG-SEC)\u4e3b\u50ac\u306e\u56fd\u969b\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0\u306e\u958b\u50ac\u3092\u4e0b\u8a18\u306e\u901a\u308a\u958b\u50ac\u3057\u307e\u3059\uff0e<\/p>\n<p style=\"font-weight: 400;text-align: center\">\u8a18<\/p>\n<p style=\"font-weight: 400\">\u540d\u79f0\uff1a The 3rd\u00a0International Symposium on AI Safety and Security 2025<\/p>\n<p style=\"font-weight: 400\">\u4e3b\u50ac\uff1a\u4eba\u5de5\u77e5\u80fd\u5b66\u4f1a\u5b89\u5168\u6027\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a(SIG-SEC)<\/p>\n<p style=\"font-weight: 400\">\u5f8c\u63f4\uff1aJDC\uff0fIISEC<\/p>\n<p style=\"font-weight: 400\">\u65e5\u6642\uff1a2026\u5e741\u670814\u65e5(\u6c34)<\/p>\n<p style=\"font-weight: 400\">\u4f1a\u5834\uff1a\u60c5\u5831\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u5927\u5b66\u9662\u5927\u5b66(IISEC) 303,304\u6559\u5ba4 (\u5bfe\u9762\u306e\u307f)<br \/>\n\u6a2a\u6d5c\u5e02\u795e\u5948\u5ddd\u533a\u9db4\u5c4b\u753a2-14-1<\/p>\n<p style=\"font-weight: 400\">\u4f1a\u8cbb\uff1a\u7121\u6599<\/p>\n<p style=\"font-weight: 400\">\u30d7\u30ed\u30b0\u30e9\u30e0\uff1a<\/p>\n<table style=\"font-weight: 400\">\n<tbody>\n<tr>\n<td width=\"104\">13:30<\/td>\n<td width=\"462\">Opening<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">13:30-14:30<\/td>\n<td width=\"462\">Adi Shamir, \u201cDeep Neural Cryptography\u201d<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">14:30-14:40<\/td>\n<td width=\"462\">Break<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">14:40-15:10<\/td>\n<td width=\"462\">Hiroaki Maeshima, \u201cAn Accuracy-preserving Defense Method against Adversarial Examples in Probabilistic Models,\u201d IISEC &amp; NTT-TX.<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">15:10-15:20<\/td>\n<td width=\"462\">Break<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">15:20-15:50<\/td>\n<td width=\"462\">Takayuki Miura, \u201cScale&#8217;s Blind Spot: Psychological Vulnerability in LLM,\u201d NTT Social Informatics Laboratories<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">15:50-16:00<\/td>\n<td width=\"462\">Break<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">16:00-16:30<\/td>\n<td width=\"462\">Razvan Beuran, &#8220;Experimental Evaluation of Non-Natural Language Prompt Injection Attacks on LLMs,&#8221; JAIST.<\/td>\n<\/tr>\n<tr>\n<td width=\"104\">16:40<\/td>\n<td width=\"462\">Farewell<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>\u7533\u3057\u8fbc\u307f\u5148URL\uff1a<\/p>\n<p><a href=\"https:\/\/www.ai-gakkai.or.jp\/sig-system\/sigusers\/add\/sec\/int_sigsec2026\">https:\/\/www.ai-gakkai.or.jp\/sig-system\/sigusers\/add\/sec\/int_sigsec2026<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eba\u5de5\u77e5\u80fd\u5b66\u4f1a\u5b89\u5168\u6027\u3068\u30bb\u30ad\u30e5\u30ea\u30c6\u30a3\u7814\u7a76\u4f1a(SIG-SEC)\u4e3b\u50ac\u306e\u56fd\u969b\u30b7\u30f3\u30dd\u30b8\u30a6\u30e0\u306e\u958b\u50ac\u3092\u4e0b\u8a18\u306e\u901a\u308a\u958b\u50ac\u3057\u307e\u3059\uff0e \u8a18 \u540d\u79f0\uff1a The 3rd\u00a0International Symposium on AI Safety and  [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"_links":{"self":[{"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/pages\/241"}],"collection":[{"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/comments?post=241"}],"version-history":[{"count":8,"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/pages\/241\/revisions"}],"predecessor-version":[{"id":252,"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/pages\/241\/revisions\/252"}],"wp:attachment":[{"href":"https:\/\/www.ai-gakkai.or.jp\/sig-sec\/wp-json\/wp\/v2\/media?parent=241"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}