AIセキュリティポータルbot

Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems

Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05
ウォーターマーキング
データ生成
侵入検知システム

FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks

Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04
バックドア攻撃
悪意のあるクライアント
連合学習

Hot PATE: Private Aggregation of Distributions for Diverse Task

Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17
ウォーターマーキング
プライバシー保護手法
計算効率

Tree of Attacks: Jailbreaking Black-Box LLMs Automatically

Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31
クエリ生成手法
プロンプトインジェクション
透かし評価

Intrusion Detection System with Machine Learning and Multiple Datasets

Authors: Haiyan Xuan, Mohith Manohar | Published: 2023-12-04
データ前処理
ハイパーパラメータ調整
侵入検知システム

Rethinking PGD Attack: Is Sign Function Necessary?

Authors: Junjie Yang, Tianlong Chen, Xuxi Chen, Zhangyang Wang, Yingbin Liang | Published: 2023-12-03 | Updated: 2024-05-21
ポイズニング
ロバスト性評価
敵対的攻撃

Breaking XOR Arbiter PUFs without Reliability Information

Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03
PUFの評価手法
ウォーターマーキング
攻撃手法

FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning

Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02
ウォーターマーキング
不正取引
透かし評価

Malicious code detection in android: the role of sequence characteristics and disassembling methods

Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02
LSTMモデル性能評価
ウォーターマーキング
マルウェア分類

Survey of Security Issues in Memristor-based Machine Learning Accelerators for RF Analysis

Authors: William Lillis, Max Cohen Hoffing, Wayne Burleson | Published: 2023-12-01
セキュリティ分析
脅威モデリング
透かしの耐久性