Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07 WatermarkingDefense Method 2023.12.07 2025.05.28 Literature Database
Understanding (Un)Intended Memorization in Text-to-Image Generative Models Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06 Evolution of AIWatermarkingCybersecurity 2023.12.06 2025.05.28 Literature Database
Dr. Jekyll and Mr. Hyde: Two Faces of LLMs Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek | Published: 2023-12-06 | Updated: 2024-10-07 Character Role ActingPrompt InjectionPoisoning 2023.12.06 2025.05.28 Literature Database
Feature Analysis of Encrypted Malicious Traffic Authors: Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp | Published: 2023-12-06 Certificate RatioCertificate Ratio Analysis 2023.12.06 2025.05.28 Literature Database
Low-Cost High-Power Membership Inference Attacks Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12 Membership InferenceLow-Cost Membership Inference MethodAttack Method 2023.12.06 2025.05.28 Literature Database
A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06 Robustness EvaluationIntrusion Detection SystemAdversarial attack 2023.12.06 2025.05.28 Literature Database
Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15 Robustness EvaluationWatermark RobustnessWatermark Evaluation 2023.12.05 2025.05.28 Literature Database
When PETs misbehave: A Contextual Integrity analysis Authors: Ero Balsa, Yan Shvartzshnaider | Published: 2023-12-05 WatermarkingPrivacy ProtectionPrivacy Protection Method 2023.12.05 2025.05.28 Literature Database
Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05 WatermarkingData GenerationIntrusion Detection System 2023.12.05 2025.05.28 Literature Database
FedBayes: A Zero-Trust Federated Learning Aggregation to Defend Against Adversarial Attacks Authors: Marc Vucovich, Devin Quinn, Kevin Choi, Christopher Redino, Abdul Rahman, Edward Bowen | Published: 2023-12-04 Backdoor AttackMalicious ClientFederated Learning 2023.12.04 2025.05.28 Literature Database