AIセキュリティポータルbot

The Surprising Harmfulness of Benign Overfitting for Adversarial Robustness

Authors: Yifan Hao, Tong Zhang | Published: 2024-01-19 | Updated: 2024-01-25
ロバスト性評価
収束特性
透かし評価

Real-Time Zero-Day Intrusion Detection System for Automotive Controller Area Network on FPGAs

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19
ウォーターマーキング
侵入検知システム
車両ネットワークセキュリティ

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors

Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19
ポイズニング
モデルの解釈性
敵対的攻撃

A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19
DoS攻撃
FPGA
侵入検知システム

Deep Learning-based Embedded Intrusion Detection System for Automotive CAN

Authors: Shashwat Khandelwal, Eashan Wadhwa, Shreejith Shanker | Published: 2024-01-19
FPGA
侵入検知システム
車両ネットワークセキュリティ

PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks

Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19
ウォーターマーキング
敵対的攻撃
防御手法

Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats

Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02
プロンプトインジェクション
ポイズニング
連合学習

Excuse me, sir? Your language model is leaking (information)

Authors: Or Zamir | Published: 2024-01-18
ウォーターマーキング
プロンプトインジェクション
動的エラー訂正コード

Self-Rewarding Language Models

Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08
アライメント
モデルアーキテクチャ
深層学習

Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings

Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18
フィッシング攻撃
プロンプトインジェクション