AIセキュリティポータルbot

Cream Skimming the Underground: Identifying Relevant Information Points from Online Forums

Authors: Felipe Moreno-Vera, Mateus Nogueira, Cainã Figueiredo, Daniel Sadoc Menasché, Miguel Bicudo, Ashton Woiwood, Enrico Lovat, Anton Kocheturov, Leandro Pfleger de Aguiar | Published: 2023-08-03
サイバー攻撃
データ収集
脆弱性管理

URET: Universal Robustness Evaluation Toolkit (for Evasion)

Authors: Kevin Eykholt, Taesung Lee, Douglas Schales, Jiyong Jang, Ian Molloy, Masha Zorin | Published: 2023-08-03
データ生成
敵対的サンプル
敵対的攻撃

SoK: Assessing the State of Applied Federated Machine Learning

Authors: Tobias Müller, Maximilian Stäbler, Hugo Gascón, Frank Köster, Florian Matthes | Published: 2023-08-03
スケーラビリティ分析
データ保護手法
連合学習

Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud

Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02
多者計算
深層学習手法
透かしの耐久性

Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks

Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03
敵対的サンプル
敵対的攻撃
透かしの耐久性

IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications

Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02
IoTデバイス識別
データ前処理
脆弱性検出

Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation

Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01
医療データの透かし設定
透かしの耐久性
連合学習

Differentially Private Linear Regression with Linked Data

Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08
セキュアロジスティック回帰
データ生成
プライバシー保護手法

Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel

Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03
データ生成
脆弱性検出
量子暗号技術

Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms

Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01
敵対的攻撃
最適化手法
線形モデル