AIセキュリティポータルbot

Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs

Authors: Helen Jenne, Sinan G. Aksoy, Daniel Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine | Published: 2023-11-08
Topology Analysis
Properties of Hypergraphs
Communication Analysis

Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox

Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07
Security Analysis
Dataset Generation
Deep Learning Method

Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications

Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29
Prompt Injection
Experimental Validation
Attack Method

Quantization-aware Neural Architectural Search for Intrusion Detection

Authors: Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte | Published: 2023-11-07 | Updated: 2024-03-02
Improvement of Learning
Deep Learning Method
Quantization and Privacy

Input Reconstruction Attack against Vertical Federated Large Language Models

Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24
Characteristics of VFL
Privacy Protection
Defense Method

SoK: Memorisation in machine learning

Authors: Dmitrii Usynin, Moritz Knolle, Georgios Kaissis | Published: 2023-11-06
Privacy Technique
Memory Evaluation
Deep Learning Method

ELEGANT: Certified Defense on the Fairness of Graph Neural Networks

Authors: Yushun Dong, Binchi Zhang, Hanghang Tong, Jundong Li | Published: 2023-11-05
Graph Neural Network
Bias Mitigation Techniques
Prompt Injection

Security Challenges in Autonomous Systems Design

Authors: Mohammad Hamad, Sebastian Steinhorst | Published: 2023-11-05 | Updated: 2023-12-04
Cybersecurity
Competitive Cooperative Systems
Automated Response to Attacks in Autonomous Systems

OverHear: Headphone based Multi-sensor Keystroke Inference

Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04
Framework
Headphone Usage
User Activity Analysis

Comprehensive Assessment of Toxicity in ChatGPT

Authors: Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang | Published: 2023-11-03
Abuse of AI Chatbots
Prompt Injection
Inappropriate Content Generation