AIセキュリティポータルbot

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14
Watermarking
Training Protocol
Privacy Protection Method

Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach

Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13
FPGA
Resource optimization
Computational Efficiency

Multimodal Attack Detection for Action Recognition Models

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13
DoS Mitigation
Adversarial Training
Defense Method

Empowering Malware Detection Efficiency within Processing-in-Memory Architecture

Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12
Watermarking
Malware Classification
Computational Efficiency

JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models

Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12
LLM Performance Evaluation
Prompt Injection
Evaluation Method

Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward

Authors: Xuan Xie, Jiayang Song, Zhehua Zhou, Yuheng Huang, Da Song, Lei Ma | Published: 2024-04-12
LLM Security
LLM Performance Evaluation
Prompt Injection

Subtoxic Questions: Dive Into Attitude Change of LLM’s Response in Jailbreak Attempts

Authors: Tianyu Zhang, Zixuan Zhao, Jiaqi Huang, Jingyu Hua, Sheng Zhong | Published: 2024-04-12
LLM Security
Prompt Injection
Prompt Engineering

A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions

Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11
Watermarking
Security of Signal Transmission
Physical layer security

Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers

Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11
Edge Computing
Adversarial Example
Adversarial Training

Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks

Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11
Watermarking
Cybersecurity
Dataset Generation