AIセキュリティポータルbot

Cross-Domain AI for Early Attack Detection and Defense Against Malicious Flows in O-RAN

Authors: Bruno Missi Xavier, Merim Dzaferagic, Irene Vilà, Magnos Martinello, Marco Ruffini | Published: 2024-01-17
O-RAN Security
Cyber Attack
Data Collection

Machine Learning for Healthcare-IoT Security: A Review and Risk Mitigation

Authors: Mirza Akhi Khatun, Sanober Farheen Memon, Ciarán Eising, Lubna Luxmi Dhirani | Published: 2024-01-17
DDoS Attack
Cybersecurity
Advancements in Medical IoT

AntiPhishStack: LSTM-based Stacked Generalization Model for Optimized Phishing URL Detection

Authors: Saba Aslam, Hafsa Aslam, Arslan Manzoor, Chen Hui, Abdur Rasool | Published: 2024-01-17 | Updated: 2024-01-21
Stacking Model
Phishing Detection
Deep Learning Method

Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs

Authors: Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert | Published: 2024-01-16
GPU Vulnerability
GPU Vulnerability
Watermark Evaluation

The Effect of Intrinsic Dataset Properties on Generalization: Unraveling Learning Differences Between Natural and Medical Images

Authors: Nicholas Konz, Maciej A. Mazurowski | Published: 2024-01-16 | Updated: 2024-02-21
Impact of Generalization
Medical Image Analysis
Watermark Evaluation

ADVENT: Attack/Anomaly Detection in VANETs

Authors: Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood | Published: 2024-01-16
Dataset Generation
Malicious Node Detection
Federated Learning

X Hacking: The Threat of Misguided AutoML

Authors: Rahul Sharma, Sergey Redyuk, Sumantrak Mukherjee, Andrea Sipka, Sebastian Vollmer, David Selby | Published: 2024-01-16 | Updated: 2024-02-12
XAI (Explainable AI)
Bias
Model Interpretability

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19
Poisoning
Poisoning Attack
Federated Learning

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method

Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications

Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16
DoS Mitigation
Algorithm
Malicious Node Detection