AIセキュリティポータルbot

DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches

Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19
DDoS Attack Detection
IoT Device Identification
Watermarking

Privacy-Preserving UCB Decision Process Verification via zk-SNARKs

Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06
Algorithm
Watermarking
Privacy Protection

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi | Published: 2024-04-18 | Updated: 2024-05-08
Data Protection Method
Resource optimization
Speech Synthesis Technology

Decomposing and Editing Predictions by Modeling Model Computation

Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17
Watermarking
Model Interpretability
Model editing techniques

OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing

Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17
Watermarking
Privacy Protection Method
Blockchain Technology

LLMs for Cyber Security: New Opportunities

Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17
LLM Security
Cybersecurity

LMEraser: Large Model Unlearning through Adaptive Prompt Tuning

Authors: Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia | Published: 2024-04-17
Clustering methods
Privacy Protection Method
Model Performance Evaluation

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15
URL analysis techniques
Phishing Detection
Deep Learning Method

Layered Uploading for Quantum Convolutional Neural Networks

Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13
Model Design
Loss Function
Machine Learning Technology

Federated Learning on Riemannian Manifolds with Differential Privacy

Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15
Watermarking
Privacy Protection Method
Convergence Analysis