AIセキュリティポータルbot

Deep Learning-based Embedded Intrusion Detection System for Automotive CAN

Authors: Shashwat Khandelwal, Eashan Wadhwa, Shreejith Shanker | Published: 2024-01-19
FPGA
侵入検知システム
車両ネットワークセキュリティ

PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks

Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19
ウォーターマーキング
敵対的攻撃
防御手法

Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats

Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02
プロンプトインジェクション
ポイズニング
連合学習

Excuse me, sir? Your language model is leaking (information)

Authors: Or Zamir | Published: 2024-01-18
ウォーターマーキング
プロンプトインジェクション
動的エラー訂正コード

Self-Rewarding Language Models

Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08
アライメント
モデルアーキテクチャ
深層学習

Large Language Model Lateral Spear Phishing: A Comparative Study in Large-Scale Organizational Settings

Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18
フィッシング攻撃
プロンプトインジェクション

MedBlindTuner: Towards Privacy-preserving Fine-tuning on Biomedical Images with Transformers and Fully Homomorphic Encryption

Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-01-17
ウォーターマーキング
プライバシー保護
医療画像分析

Zero Trust Implementation in the Emerging Technologies Era: Survey

Authors: Abraham Itzhak Weinberg, Kelly Cohen | Published: 2024-01-17
AIと自動化の役割
ゼロトラスト
動的なポリシーやアクセス制御

Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN

Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17
O-RANセキュリティ
サイバー攻撃
データ収集

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17
DDoS攻撃
サイバーセキュリティ
医療IoTの進展