AIセキュリティポータルbot

Evaluation of LLM Chatbots for OSINT-based Cyber Threat Awareness

Authors: Samaneh Shafee, Alysson Bessani, Pedro M. Ferreira | Published: 2024-01-26 | Updated: 2024-04-19
LLM Performance Evaluation
Cybersecurity
Prompt Injection

GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption

Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26
Watermarking
Privacy Protection
Privacy Protection Method

Zeroth-Order primal-dual Alternating Projection Gradient Algorithms for Nonconvex Minimax Problems with Coupled linear Constraints

Authors: Huiling Zhang, Zi Xu, Yuhong Dai | Published: 2024-01-26
Convergence Property
Optimization Problem
Optimization Methods

Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors

Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis | Published: 2024-01-26 | Updated: 2024-04-14
Watermarking
Integration of Digital Signatures and Machine Learning
Verification of Digital Signatures

Decentralized Federated Learning: A Survey on Security and Privacy

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25
Attack Methods against DFL
Backdoor Attack
Privacy Protection Method

SunBlock: Cloudless Protection for IoT Systems

Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi | Published: 2024-01-25
Resource optimization
IoT Threat Detection in Home Routers
Threat modeling

Sparse and Transferable Universal Singular Vectors Attack

Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25
Watermarking
Adversarial Attack Detection
Optimization Methods

A Training Rate and Survival Heuristic for Inference and Robustness Evaluation (TRASHFIRE)

Authors: Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth | Published: 2024-01-24 | Updated: 2024-09-11
Hyperparameter Tuning
Model Performance Evaluation
Adversarial Example

Predicting SSH keys in Open SSH Memory dumps

Authors: Florian Rascoussier | Published: 2024-01-24
Watermarking
Data Preprocessing
Memory Management Method

Beimingwu: A Learnware Dock System

Authors: Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou | Published: 2024-01-24
Beimingwu System
Watermarking
Efficient Resolution of Learning Tasks