AIセキュリティポータルbot

A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS

Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13
IoMTセキュリティ
サイバーセキュリティ

Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards

Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13
サイバーセキュリティ
大規模言語モデル
攻撃の評価

A Novel Approach to Network Traffic Analysis: the HERA tool

Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13
サイバーセキュリティ
データセット生成
ネットワーク脅威検出

The Essentials of AI for Life and Society: An AI Literacy Course for the University Community

Authors: Joydeep Biswas, Don Fussell, Peter Stone, Kristin Patterson, Kristen Procko, Lea Sabatini, Zifan Xu | Published: 2025-01-13
プライバシー設計原則
人工知能の役割
教育やフォローアップ

Logic Meets Magic: LLMs Cracking Smart Contract Vulnerabilities

Authors: ZeKe Xiao, Qin Wang, Hammond Pearce, Shiping Chen | Published: 2025-01-13
LLM性能評価
サイバーセキュリティ
スマートコントラクト

Efficient Phishing URL Detection Using Graph-based Machine Learning and Loopy Belief Propagation

Authors: Wenye Guo, Qun Wang, Hao Yue, Haijian Sun, Rose Qingyang Hu | Published: 2025-01-12
ネットワーク脅威検出
フィッシング検出
収束分析

MPCache: MPC-Friendly KV Cache Eviction for Efficient Private Large Language Model Inference

Authors: Wenxuan Zeng, Ye Dong, Jinjin Zhou, Junming Ma, Jin Tan, Runsheng Wang, Meng Li | Published: 2025-01-12
LLM性能評価
MPCアルゴリズム
トークン収集手法

Resilient Endurance-Aware NVM-based PUF against Learning-based Attacks

Authors: Hassan Nassar, Ming-Liang Wei, Chia-Lin Yang, Jörg Henkel, Kuan-Hsun Chen | Published: 2025-01-10
サイバーセキュリティ
暗号学
耐久性問題

Unveiling Malware Patterns: A Self-analysis Perspective

Authors: Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Xiuzhen Cheng | Published: 2025-01-10
マルウェア分類
基本ブロック解析
画像特徴抽出

Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures

Authors: Sina Ahmadi | Published: 2025-01-10
ゼロトラスト
ユーザー活動解析
動的アクセス制御