AIセキュリティポータルbot

WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces

Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12
サイバーセキュリティ
ランサムウェア評価
最適化アルゴリズムの選択と評価

A Framework for Cost-Effective and Self-Adaptive LLM Shaking and Recovery Mechanism

Authors: Zhiyu Chen, Yu Li, Suochao Zhang, Jingbo Zhou, Jiwen Zhou, Chenfu Bao, Dianhai Yu | Published: 2024-03-12
ウォーターマーキング
プライバシー保護手法
フレームワーク

Don’t Forget What I did?: Assessing Client Contributions in Federated Learning

Authors: Bishwamittra Ghosh, Debabrota Basu, Fu Huazhu, Wang Yuan, Renuga Kanagavelu, Jiang Jin Peng, Liu Yong, Goh Siow Mong Rick, Wei Qingsong | Published: 2024-03-11
クライアント貢献評価
最適化手法
連合学習

ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts

Authors: Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu | Published: 2024-03-11 | Updated: 2024-03-18
スマートコントラクト
プロンプトインジェクション
自動脆弱性修復

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
セキュリティ分析
バックドア攻撃
ポイズニング

Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains

Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07
ポイズニング
最適化問題
連合学習

Stealing Part of a Production Language Model

Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, Florian Tramèr | Published: 2024-03-11 | Updated: 2024-07-09
プロンプトリーキング
モデルの堅牢性
モデル抽出攻撃

DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification

Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko | Published: 2024-03-11
DNN IP保護手法
ウォーターマーキング
モデル性能評価

Fake or Compromised? Making Sense of Malicious Clients in Federated Learning

Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10
バックドア攻撃
ポイズニング
悪意のあるクライアント

Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics

Authors: Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde | Published: 2024-03-10
データセット生成
ライブラリ分類