AIセキュリティポータルbot

Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism

Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05
Watermarking
Model Performance Evaluation
Adversarial Example

Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection

Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça | Published: 2024-04-05
Model Performance Evaluation
Time-Related Features
Feature Selection Method

Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning

Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05
Poisoning
Federated Learning
Defense Method

AuditGPT: Auditing Smart Contracts with ChatGPT

Authors: Shihao Xia, Shuai Shao, Mengting He, Tingting Yu, Linhai Song, Yiying Zhang | Published: 2024-04-05
ERC Rules
ERC Compliance Evaluation
Prompt Injection

An Investigation into Misuse of Java Security APIs by Large Language Models

Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04
Misuse of Security API
Security Analysis
Prompt Injection

Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning

Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04
Watermarking
Membership Inference
Label Inference Attack

Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption

Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07
Watermarking
Model Performance Evaluation
Computational Efficiency

Goldfish: An Efficient Federated Unlearning Framework

Authors: Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo | Published: 2024-04-04 | Updated: 2024-04-23
Model Performance Evaluation
Loss Function
Federated Learning

“Are Adversarial Phishing Webpages a Threat in Reality?” Understanding the Users’ Perception of Adversarial Webpages

Authors: Ying Yuan, Qingying Hao, Giovanni Apruzzese, Mauro Conti, Gang Wang | Published: 2024-04-03
Phishing Attack
Detection Rate of Phishing Attacks
Phishing Detection

LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation

Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04
Watermarking
Security Analysis
Anomaly Detection Method