AIセキュリティポータルbot

A Comprehensive Study of Privacy Risks in Curriculum Learning

Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16
Membership Inference
Model Performance Evaluation
Attack Method

Improved Flow Recovery from Packet Data

Authors: Anthony Kenyon, David Elizondo, Lipika Deka | Published: 2023-10-15
Data Management System
Flow Inconsistency
Protocol Performance Evaluation

ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?

Authors: Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le | Published: 2023-10-15
Program Analysis
Prompt Engineering
Vulnerability Prediction

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15
Cybersecurity
Network Threat Detection
Machine Learning Method

Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing

Authors: Marc Schmitt, Ivan Flechais | Published: 2023-10-15
Detection Rate of Phishing Attacks
Malicious Content Generation
Advanced Targeting

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15
Data Generation
Privacy Protection Method
evaluation metrics

A Blockchain-empowered Multi-Aggregator Federated Learning Architecture in Edge Computing with Deep Reinforcement Learning Optimization

Authors: Xiao Li, Weili Wu | Published: 2023-10-14
Byzantine Consensus Mechanism
Blockchain Technology
Federated Learning

BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14
Attack Evaluation
Adversarial Example
Optimization Methods

DPZero: Private Fine-Tuning of Language Models without Backpropagation

Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06
Privacy Protection
Privacy Protection Method
Optimization Methods

On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI

Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais | Published: 2023-10-14
Malicious Package Detection
Attack Evaluation
Feature Selection Method