AIセキュリティポータルbot

Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion

Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21
Membership Inference
Watermark Robustness
Watermark Evaluation

PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud

Authors: Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang | Published: 2024-04-20
Watermarking
Quantum Framework
Quantum Cryptography Technology

Evaluating the Effectiveness of LLMs in Introductory Computer Science Education: A Semester-Long Field Study

Authors: Wenhan Lyu, Yimeng Wang, Tingting, Chung, Yifan Sun, Yixuan Zhang | Published: 2024-04-20 | Updated: 2024-05-03
Data Extraction and Analysis
Human-Centered Computing
Education and Follow-up

Intrusion Detection at Scale with the Assistance of a Command-line Language Model

Authors: Jiongliang Lin, Yiwen Guo, Hao Chen | Published: 2024-04-20
Command Analysis
Anomaly Detection Method
Automated Intrusion Detection System

CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models

Authors: Manish Bhatt, Sahana Chennabasappa, Yue Li, Cyrus Nikolaidis, Daniel Song, Shengye Wan, Faizan Ahmad, Cornelius Aschermann, Yaohui Chen, Dhaval Kapil, David Molnar, Spencer Whitman, Joshua Saxe | Published: 2024-04-19
LLM Security
Cybersecurity
Prompt Injection

Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models

Authors: Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen | Published: 2024-04-19 | Updated: 2024-04-22
Backdoor Attack
Vulnerabilities in Autonomous Driving Technology

Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset

Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19
Cybersecurity
Dataset Generation
Ransomware Assessment

DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches

Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19
DDoS Attack Detection
IoT Device Identification
Watermarking

Privacy-Preserving UCB Decision Process Verification via zk-SNARKs

Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06
Algorithm
Watermarking
Privacy Protection

AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management

Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi | Published: 2024-04-18 | Updated: 2024-05-08
Data Protection Method
Resource optimization
Speech Synthesis Technology