AIセキュリティポータルbot

Unveiling Hidden Links Between Unseen Security Entities

Authors: Daniel Alfasi, Tal Shapira, Anat Bremler Barr | Published: 2024-03-04
リンク予測手法
知識グラフ推論
脆弱性管理

Robustness bounds on the successful adversarial examples in probabilistic models: Implications from Gaussian processes

Authors: Hiroaki Maeshima, Akira Otsuka | Published: 2024-03-04 | Updated: 2025-03-19
攻撃手法
敵対的サンプル
透かし評価

MaliGNNoma: GNN-Based Malicious Circuit Classifier for Secure Cloud FPGAs

Authors: Lilas Alrahis, Hassan Nassar, Jonas Krautter, Dennis Gnad, Lars Bauer, Jorg Henkel, Mehdi Tahoori | Published: 2024-03-04
FPGA
GNN
マルチテナンシー

DECOR: Enhancing Logic Locking Against Machine Learning-Based Attacks

Authors: Yinghua Hu, Kaixin Yang, Subhajit Dutta Chowdhury, Pierluigi Nuzzo | Published: 2024-03-04
ウォーターマーキング
透かしの耐久性
防御手法

Using LLMs for Tabletop Exercises within the Security Domain

Authors: Sam Hays, Jules White | Published: 2024-03-03
サイバーセキュリティ
テーブルトップ演習の課題
プロンプトインジェクション

IoT Device Labeling Using Large Language Models

Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03
IoTデバイス識別
データ収集
ラベル

Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach

Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03
データの起源と変遷
ポイズニング
連合学習

Analysis of Privacy Leakage in Federated Large Language Models

Authors: Minh N. Vu, Truc Nguyen, Tre' R. Jeter, My T. Thai | Published: 2024-03-02
プライバシー保護手法
ポイズニング
連合学習

A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks

Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02
ウォーターマーキング
モデル性能評価
機械学習手法

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
インシデント対応計画
サイバーセキュリティ
リスク管理