AIセキュリティポータルbot

Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks

Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07
ウォーターマーキング
防御手法

Understanding (Un)Intended Memorization in Text-to-Image Generative Models

Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06
AIの進化
ウォーターマーキング
サイバーセキュリティ

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek | Published: 2023-12-06 | Updated: 2024-10-07
キャラクター役割演技
プロンプトインジェクション
ポイズニング

Feature Analysis of Encrypted Malicious Traffic

Authors: Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp | Published: 2023-12-06
証明書の比率
証明書の比率分析

Low-Cost High-Power Membership Inference Attacks

Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12
メンバーシップ推論
低コストのメンバシップ推論手法
攻撃手法

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System

Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06
ロバスト性評価
侵入検知システム
敵対的攻撃

Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More

Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15
ロバスト性評価
透かしの耐久性
透かし評価

When PETs misbehave: A Contextual Integrity analysis

Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05
ウォーターマーキング
プライバシー保護
プライバシー保護手法

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05
ウォーターマーキング
データ生成
侵入検知システム

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04
バックドア攻撃
悪意のあるクライアント
連合学習