AIセキュリティポータルbot

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11
Graph Neural Network
Intrusion Detection System
Anomaly Detection Method

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization

Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11
Watermarking
Memory Management Method
Model Performance Evaluation

A provable initialization and robust clustering method for general mixture models

Authors: Soham Jana, Jianqing Fan, Sanjeev Kulkarni | Published: 2024-01-10 | Updated: 2024-10-23
Clustering methods
Robustness Evaluation
Adversarial attack

Sleeper Agents: Training Deceptive LLMs that Persist Through Safety Training

Authors: Evan Hubinger, Carson Denison, Jesse Mu, Mike Lambert, Meg Tong, Monte MacDiarmid, Tamera Lanham, Daniel M. Ziegler, Tim Maxwell, Newton Cheng, Adam Jermyn, Amanda Askell, Ansh Radhakrishnan, Cem Anil, David Duvenaud, Deep Ganguli, Fazl Barez, Jack Clark, Kamal Ndousse, Kshitij Sachan, Michael Sellitto, Mrinank Sharma, Nova DasSarma, Roger Grosse, Shauna Kravec, Yuntao Bai, Zachary Witten, Marina Favaro, Jan Brauner, Holden Karnofsky, Paul Christiano, Samuel R. Bowman, Logan Graham, Jared Kaplan, Sören Mindermann, Ryan Greenblatt, Buck Shlegeris, Nicholas Schiefer, Ethan Perez | Published: 2024-01-10 | Updated: 2024-01-17
Backdoor Attack
Prompt Injection
Reinforcement Learning

Brave: Byzantine-Resilient and Privacy-Preserving Peer-to-Peer Federated Learning

Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Radha Poovendran | Published: 2024-01-10
Byzantine Resilience
Poisoning
Federated Learning

Optimized Ensemble Model Towards Secured Industrial IoT Devices

Authors: MohammadNoor Injadat | Published: 2024-01-10
Model Performance Evaluation
Intrusion Detection System
Optimization Methods

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
Network Threat Detection
Model Extraction Attack
Performance Evaluation Method

Local Privacy-preserving Mechanisms and Applications in Machine Learning

Authors: Likun Qin, Tianshuo Qiu | Published: 2024-01-08
Data Privacy Assessment
Privacy Protection
Federated Learning

Privacy-Preserving in Blockchain-based Federated Learning Systems

Authors: Sameera K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti | Published: 2024-01-07
Privacy Protection Method
Blockchain Technology
Federated Learning

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07
Class Imbalance
Model Performance Evaluation
Anomaly Detection Method