AIセキュリティポータルbot

Steganographic Capacity of Deep Learning Models

Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25
データの隠蔽
マルウェア分類
情報隠蔽手法

Locally Differentially Private Distributed Online Learning with Guaranteed Optimality

Authors: Ziqin Chen, Yongqiang Wang | Published: 2023-06-25 | Updated: 2024-08-23
アルゴリズム設計
プライバシー保護
収束保証

Federated Learning Approach for Distributed Ransomware Analysis

Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25
マルウェア分類
マルウェア検出手法
連合学習

On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions

Authors: Reza Fayyazi, Shanchieh Jay Yang | Published: 2023-06-24 | Updated: 2023-08-22
プロンプトインジェクション
マルウェア分類
自然言語処理

Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks

Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10
アルゴリズム設計
敵対的攻撃
統計的検定

Boosting Model Inversion Attacks with Adversarial Examples

Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24
ポイズニング
敵対的サンプル
敵対的攻撃

Creating Valid Adversarial Examples of Malware

Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23
マルウェア分類
マルウェア検出手法
敵対的攻撃

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
性能評価
脅威モデリング
連合学習

Visual Adversarial Examples Jailbreak Aligned Large Language Models

Authors: Xiangyu Qi, Kaixuan Huang, Ashwinee Panda, Peter Henderson, Mengdi Wang, Prateek Mittal | Published: 2023-06-22 | Updated: 2023-08-16
プロンプトインジェクション
不適切コンテンツ生成
敵対的攻撃

Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection

Authors: Mert Nakıp, Baran Can Gül, Erol Gelenbe | Published: 2023-06-22 | Updated: 2023-11-28
アルゴリズム設計
マルウェア検出手法
連合学習