AIセキュリティポータルbot

Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2023-10-14
Dataset Generation
Trojan Detection
Quantification of Uncertainty

Embarrassingly Simple Text Watermarks

Authors: Ryoma Sato, Yuki Takezawa, Han Bao, Kenta Niwa, Makoto Yamada | Published: 2023-10-13
Watermarking
Steganography Techniques
Data Generation

Characterizing climate pathways using feature importance on echo state networks

Authors: Katherine Goode, Daniel Ries, Kellie McClernon | Published: 2023-10-12
Data Generation
Model Interpretability
Climate Information

Harnessing the Power of LLM to Support Binary Taint Analysis

Authors: Puzhuo Liu, Chengnian Sun, Yaowen Zheng, Xuan Feng, Chuan Qin, Yuncheng Wang, Zhenyang Xu, Zhi Li, Peng Di, Yu Jiang, Limin Sun | Published: 2023-10-12 | Updated: 2025-01-09
Security Analysis
Prompting Strategy
Dynamic Analysis

ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification

Authors: Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2023-10-12 | Updated: 2024-01-12
IoT Device Identification
Data Generation
Self-Attention Mechanism

Why Train More? Effective and Efficient Membership Inference via Memorization

Authors: Jihye Choi, Shruti Tople, Varun Chandrasekaran, Somesh Jha | Published: 2023-10-12
Sample Complexity
Membership Inference
Overfitting and Memorization

In-Context Unlearning: Language Models as Few Shot Unlearners

Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06
Data Leakage
Performance Evaluation
Machine Learning Technology

ClausewitzGPT Framework: A New Frontier in Theoretical Large Language Model Enhanced Information Operations

Authors: Benjamin Kereopa-Yorke | Published: 2023-10-11
Framework
Risk Management

Secure Decentralized Learning with Blockchain

Authors: Xiaoxue Zhang, Yifan Hua, Chen Qian | Published: 2023-10-10 | Updated: 2024-03-11
Blockchain Technology
Poisoning
Federated Learning

Catastrophic Jailbreak of Open-source LLMs via Exploiting Generation

Authors: Yangsibo Huang, Samyak Gupta, Mengzhou Xia, Kai Li, Danqi Chen | Published: 2023-10-10
Prompt Injection
Attack Evaluation
Adversarial attack