AIセキュリティポータルbot

A Review and Comparison of AI Enhanced Side Channel Analysis

Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03
Watermarking
Cybersecurity
Deep Learning Method

Data Poisoning for In-context Learning

Authors: Pengfei He, Han Xu, Yue Xing, Hui Liu, Makoto Yamada, Jiliang Tang | Published: 2024-02-03 | Updated: 2025-06-02
Poisoning
Poisoning Attack
Detection of Misinformation

Machine Unlearning in Large Language Models

Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03
Privacy Protection Method
Model Performance Evaluation
Compliance with Ethical Guidelines

Human-Centered Privacy Research in the Age of Large Language Models

Authors: Tianshi Li, Sauvik Das, Hao-Ping Lee, Dakuo Wang, Bingsheng Yao, Zhiping Zhang | Published: 2024-02-03
Privacy Protection
Prompt Injection
Human-Centered Approach

Position Paper: Assessing Robustness, Privacy, and Fairness in Federated Learning Integrated with Foundation Models

Authors: Xi Li, Jiaqi Wang | Published: 2024-02-02
Privacy Protection
Fairness evaluation
Federated Learning

TESSERACT: Eliminating Experimental Bias in Malware Classification across Space and Time (Extended Version)

Authors: Zeliang Kan, Shae McFadden, Daniel Arp, Feargus Pendlebury, Roberto Jordaney, Johannes Kinder, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2024-02-02 | Updated: 2025-04-09
Bias
Malware Classification
Time-Related Features

KTO: Model Alignment as Prospect Theoretic Optimization

Authors: Kawin Ethayarajh, Winnie Xu, Niklas Muennighoff, Dan Jurafsky, Douwe Kiela | Published: 2024-02-02 | Updated: 2024-11-19
Alignment
Data Generation Method
Deep Learning

Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors

Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter | Published: 2024-02-02
Watermarking
Model Design

Domain-Independent Deception: A New Taxonomy and Linguistic Analysis

Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu | Published: 2024-02-01
Watermarking
Domain Independence
Bias

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01
Algorithm
Website Vulnerability
Cybersecurity