AIセキュリティポータルbot

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors

Authors: Hangsheng Zhang, Dongqi Han, Yinlong Liu, Zhiliang Wang, Jiyan Sun, Shangyuan Zhuang, Jiqiang Liu, Jinsong Dong | Published: 2024-01-19
Poisoning
Model Interpretability
Adversarial attack

A Lightweight Multi-Attack CAN Intrusion Detection System on Hybrid FPGAs

Authors: Shashwat Khandelwal, Shreejith Shanker | Published: 2024-01-19
DoS Attack
FPGA
Intrusion Detection System

Deep Learning-based Embedded Intrusion Detection System for Automotive CAN

Authors: Shashwat Khandelwal, Eashan Wadhwa, Shreejith Shanker | Published: 2024-01-19
FPGA
Intrusion Detection System
Vehicle Network Security

PuriDefense: Randomized Local Implicit Adversarial Purification for Defending Black-box Query-based Attacks

Authors: Ping Guo, Zhiyuan Yang, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-19
Watermarking
Adversarial attack
Defense Method

Vulnerabilities of Foundation Model Integrated Federated Learning Under Adversarial Threats

Authors: Chen Wu, Xi Li, Jiaqi Wang | Published: 2024-01-18 | Updated: 2024-04-02
Prompt Injection
Poisoning
Federated Learning

Excuse me, sir? Your language model is leaking (information)

Authors: Or Zamir | Published: 2024-01-18
Watermarking
Prompt Injection
Dynamic Error Correction Code

Self-Rewarding Language Models

Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08
Alignment
Model Architecture
Deep Learning

Lateral Phishing With Large Language Models: A Large Organization Comparative Study

Authors: Mazal Bethany, Athanasios Galiopoulos, Emet Bethany, Mohammad Bahrami Karkevandi, Nicole Beebe, Nishant Vishwamitra, Peyman Najafirad | Published: 2024-01-18 | Updated: 2025-04-15
Phishing Attack
Prompt Injection

MedBlindTuner: Towards Privacy-preserving Fine-tuning on Biomedical Images with Transformers and Fully Homomorphic Encryption

Authors: Prajwal Panzade, Daniel Takabi, Zhipeng Cai | Published: 2024-01-17
Watermarking
Privacy Protection
Medical Image Analysis

Zero Trust Implementation in the Emerging Technologies Era: Survey

Authors: Abraham Itzhak Weinberg, Kelly Cohen | Published: 2024-01-17
Role of AI and Automation
Zero Trust
Dynamic Policies and Access Control