AIセキュリティポータルbot

Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection

Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15
Data Preprocessing
Privacy Protection
Threats of Medical AI

Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15
DDoS Attack Detection
Attack Method
Adversarial Example

Privacy at a Price: Exploring its Dual Impact on AI Fairness

Authors: Mengmeng Yang, Ming Ding, Youyang Qu, Wei Ni, David Smith, Thierry Rakotoarivelo | Published: 2024-04-15
Privacy Protection
Privacy Protection Method
Fairness evaluation

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14
Watermarking
Training Protocol
Privacy Protection Method

Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach

Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13
FPGA
Resource optimization
Computational Efficiency

Multimodal Attack Detection for Action Recognition Models

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13
DoS Mitigation
Adversarial Training
Defense Method

Empowering Malware Detection Efficiency within Processing-in-Memory Architecture

Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12
Watermarking
Malware Classification
Computational Efficiency

JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models

Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12
LLM Performance Evaluation
Prompt Injection
Evaluation Method

Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward

Authors: Xuan Xie, Jiayang Song, Zhehua Zhou, Yuheng Huang, Da Song, Lei Ma | Published: 2024-04-12
LLM Security
LLM Performance Evaluation
Prompt Injection

Subtoxic Questions: Dive Into Attitude Change of LLM’s Response in Jailbreak Attempts

Authors: Tianyu Zhang, Zixuan Zhao, Jiaqi Huang, Jingyu Hua, Sheng Zhong | Published: 2024-04-12
LLM Security
Prompt Injection
Prompt Engineering