AIセキュリティポータルbot

On the Detection of Image-Scaling Attacks in Machine Learning

Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23
Backdoor Attack
Adversarial Attack Detection
Analysis of Detection Methods

Zero-knowledge Proof Meets Machine Learning in Verifiability: A Survey

Authors: Zhibo Xing, Zijian Zhang, Jiamou Liu, Ziang Zhang, Meng Li, Liehuang Zhu, Giovanni Russello | Published: 2023-10-23
Privacy Technique
Efficient Proof System
Computational Complexity

B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction

Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23
Privacy Technique
Model Design
Machine Learning Method

Competitive Advantage Attacks to Decentralized Federated Learning

Authors: Yuqi Jia, Minghong Fang, Neil Zhenqiang Gong | Published: 2023-10-20
Client Contribution Assessment
Poisoning
Adversarial attack

Fundamental Limits of Membership Inference Attacks on Machine Learning Models

Authors: Eric Aubinais, Elisabeth Gassiat, Pablo Piantanida | Published: 2023-10-20 | Updated: 2025-05-12
Membership Inference
Adversarial attack
Machine Learning Method

An LLM can Fool Itself: A Prompt-Based Adversarial Attack

Authors: Xilie Xu, Keyi Kong, Ning Liu, Lizhen Cui, Di Wang, Jingfeng Zhang, Mohan Kankanhalli | Published: 2023-10-20
Prompt Injection
Malicious Prompt
Adversarial attack

Critical Path Prioritization Dashboard for Alert-driven Attack Graphs

Authors: Sònia Leal Díaz, Sergio Pastrana, Azqa Nadeem | Published: 2023-10-19
Security Analysis
User Experience Evaluation
Attack Graph Generation

Network-Aware AutoML Framework for Software-Defined Sensor Networks

Authors: Emre Horsanali, Yagmur Yigit, Gokhan Secinti, Aytac Karameseoglu, Berk Canberk | Published: 2023-10-19 | Updated: 2023-10-25
DDoS Attack
DDoS Attack Detection
SDN Architecture

Blind quantum machine learning with quantum bipartite correlator

Authors: Changhao Li, Boning Li, Omar Amer, Ruslan Shaydulin, Shouvanik Chakrabarti, Guoqing Wang, Haowei Xu, Hao Tang, Isidor Schoch, Niraj Kumar, Charles Lim, Ju Li, Paola Cappellaro, Marco Pistoia | Published: 2023-10-19
Privacy Protection Method
Malicious Client
Quantum Cryptography Technology

SecurityNet: Assessing Machine Learning Vulnerabilities on Public Models

Authors: Boyang Zhang, Zheng Li, Ziqing Yang, Xinlei He, Michael Backes, Mario Fritz, Yang Zhang | Published: 2023-10-19
Membership Inference
Model Extraction Attack
Attack Evaluation