AIセキュリティポータルbot

TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning

Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29
データセット生成
最適化手法
量子暗号技術

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29
スケーラビリティ分析
ネットワーク脅威検出
脆弱性管理

Group-based Robustness: A General Framework for Customized Robustness in the Real World

Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10
グループベースの堅牢性
攻撃の評価
敵対的攻撃検出

On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28
データの起源と変遷
データ汚染検出
バックドア攻撃

On the Exploitability of Instruction Tuning

Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28
プロンプトインジェクション
ポイズニング
敵対的攻撃検出

VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing

Authors: Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | Published: 2023-06-28
MPCアルゴリズム
計算複雑性
連合学習

MLSMM: Machine Learning Security Maturity Model

Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28
AIコンプライアンス
セキュリティラベル
脅威モデリング

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC解析手法
データ収集
評価指標

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
データセット生成
性能評価
脆弱性管理

Probing the Transition to Dataset-Level Privacy in ML Models Using an Output-Specific and Data-Resolved Privacy Profile

Authors: Tyler LeBlond, Joseph Munoz, Fred Lu, Maya Fuchs, Elliott Zaresky-Williams, Edward Raff, Brian Testa | Published: 2023-06-27
プライバシー評価
収束保証
収束特性