AIセキュリティポータルbot

A review of federated learning in renewable energy applications: Potential, challenges, and future directions

Authors: Albin Grataloup, Stefan Jonas, Angela Meyer | Published: 2023-12-18
Energy Management
Personalization Method
Federated Learning

Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning

Authors: Keyi Ju, Xiaoqi Qin, Hui Zhong, Xinyue Zhang, Miao Pan, Baoling Liu | Published: 2023-12-18 | Updated: 2024-03-07
Privacy Protection
Privacy Protection Method
Quantum Machine Learning

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication

Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01
Watermarking
Fingerprinting Method
Privacy Protection

A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18
Cyber Attack
Prompt Injection
Attack Method

JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

Authors: Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Ming Hu, Jie Zhang, Yang Liu, Shiqing Ma, Chao Shen | Published: 2023-12-17 | Updated: 2025-03-15
Text Perturbation Method
Prompt Injection
Attack Method

Android Malware Detection with Unbiased Confidence Guarantees

Authors: Harris Papadopoulos, Nestoras Georgiou, Charalambos Eliades, Andreas Konstantinidis | Published: 2023-12-17
Algorithm
Watermarking
Class Imbalance

SAME: Sample Reconstruction against Model Extraction Attacks

Authors: Yi Xie, Jie Zhang, Shiqian Zhao, Tianwei Zhang, Xiaofeng Chen | Published: 2023-12-17 | Updated: 2024-01-08
Watermarking
Model Performance Evaluation
Model Extraction Attack

Rethinking Robustness of Model Attributions

Authors: Sandesh Kamath, Sankalp Mittal, Amit Deshpande, Vineeth N Balasubramanian | Published: 2023-12-16
Robustness Evaluation
Watermark Robustness
Watermark Evaluation

Towards Reliable Participation in UAV-Enabled Federated Edge Learning on Non-IID Data

Authors: Youssra Cheriguene, Wael Jaafar, Halim Yanikomeroglu, Chaker Abdelaziz Kerrache | Published: 2023-12-16
Participant Selection Method
Attack Method
Federated Learning

Silent Guardian: Protecting Text from Malicious Exploitation by Large Language Models

Authors: Jiawei Zhao, Kejiang Chen, Xiaojian Yuan, Yuang Qi, Weiming Zhang, Nenghai Yu | Published: 2023-12-15 | Updated: 2024-10-10
Privacy Protection Method
Prompt Injection
Watermark Evaluation