AIセキュリティポータルbot

HW-V2W-Map: Hardware Vulnerability to Weakness Mapping Framework for Root Cause Analysis with GPT-assisted Mitigation Suggestion

Authors: Yu-Zheng Lin, Muntasir Mamun, Muhtasim Alam Chowdhury, Shuyu Cai, Mingyu Zhu, Banafsheh Saber Latibari, Kevin Immanuel Gubbi, Najmeh Nazari Bavarsad, Arjun Caputo, Avesta Sasan, Houman Homayoun, Setareh Rafatirad, Pratik Satam, Soheil Salehi | Published: 2023-12-21
CVE Information Extraction
Prompt Injection
Vulnerability Management

Benchmarking and Defending Against Indirect Prompt Injection Attacks on Large Language Models

Authors: Jingwei Yi, Yueqi Xie, Bin Zhu, Emre Kiciman, Guangzhong Sun, Xing Xie, Fangzhao Wu | Published: 2023-12-21 | Updated: 2025-01-27
Indirect Prompt Injection
Malicious Prompt
Vulnerability Analysis

Advancing SQL Injection Detection for High-Speed Data Centers: A Novel Approach Using Cascaded NLP

Authors: Kasim Tasdemir, Rafiullah Khan, Fahad Siddiqui, Sakir Sezer, Fatih Kurugollu, Sena Busra Yengec-Tasdemir, Alperen Bolat | Published: 2023-12-20
SQL Injection Attack Detection
Watermarking
Computational Efficiency

Secure Authentication Mechanism for Cluster based Vehicular Adhoc Network (VANET): A Survey

Authors: Rabia Nasir, Humaira Ashraf, NZ Jhanjhi | Published: 2023-12-20
Clustering methods
Protocol Performance Evaluation
Trust Evaluation

Rethinking Randomized Smoothing from the Perspective of Scalability

Authors: Anupriya Kumari, Devansh Bhardwaj, Sukrit Jindal | Published: 2023-12-19 | Updated: 2024-10-24
Scalability Analysis
Robustness Evaluation
Computational Efficiency

Decentralised and collaborative machine learning framework for IoT

Authors: Martín González-Soto, Rebeca P. Díaz-Redondo, Manuel Fernández-Veiga, Bruno Rodríguez-Castro, Ana Fernández-Vilas | Published: 2023-12-19
Online Learning
Prototype Network
Federated Learning

Towards an in-depth detection of malware using distributed QCNN

Authors: Tony Quertier, Grégoire Barrué | Published: 2023-12-19
Algorithm
Model Performance Evaluation
Quantum Machine Learning

EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection

Authors: Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu | Published: 2023-12-19
Watermarking
Model Performance Evaluation
Watermark Robustness

Traces of Memorisation in Large Language Models for Code

Authors: Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen | Published: 2023-12-18 | Updated: 2024-01-15
Dataset Generation
Data Leakage
Training Data Extraction Method

Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis

Authors: Lojenaa Navanesana, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara | Published: 2023-12-18
Cross-Device Portable Model
Cross-Device Analysis
Transfer Learning