AIセキュリティポータルbot

Ransomware threat mitigation through network traffic analysis and machine learning techniques

Authors: Ali Mehrban, Shirin Karimi Geransayeh | Published: 2024-01-27 | Updated: 2024-02-04
サイバーセキュリティ
ランサムウェア評価
機械学習手法

Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation

Authors: Yiling Xie, Xiaoming Huo | Published: 2024-01-27
ウォーターマーキング
敵対的訓練
適応型敵対的訓練

Better Representations via Adversarial Training in Pre-Training: A Theoretical Perspective

Authors: Yue Xing, Xiaofeng Lin, Qifan Song, Yi Xu, Belinda Zeng, Guang Cheng | Published: 2024-01-26
ポイズニング
敵対的訓練
特徴選択手法

Training Differentially Private Ad Prediction Models with Semi-Sensitive Features

Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26
アルゴリズム
ウォーターマーキング
プライバシー保護手法

Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira | Published: 2024-01-26 | Updated: 2024-04-19
LLM性能評価
サイバーセキュリティ
プロンプトインジェクション

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption

Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26
ウォーターマーキング
プライバシー保護
プライバシー保護手法

Zeroth-Order primal-dual Alternating Projection Gradient Algorithms for Nonconvex Minimax Problems with Coupled linear Constraints

Authors: Huiling Zhang, Zi Xu, Yuhong Dai | Published: 2024-01-26
収束特性
最適化問題
最適化手法

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis | Published: 2024-01-26 | Updated: 2024-04-14
ウォーターマーキング
デジタル署名と機械学習の統合
デジタル署名の検証

Decentralized Federated Learning: A Survey on Security and Privacy

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25
DFLに対する攻撃手法
バックドア攻撃
プライバシー保護手法

SunBlock: Cloudless Protection for IoT Systems

Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi | Published: 2024-01-25
リソース最適化
家庭ルーターでのIoT脅威検出
脅威モデリング