AIセキュリティポータルbot

SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification

Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17
Watermarking
Image Feature Extraction
Agricultural Data Privacy

Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection

Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17
Few-Shot Learning
LLM Performance Evaluation
Automated Intrusion Detection System

Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy

Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16
Poisoning
Attack Method
Defense Method

The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective

Authors: Tianqu Kang, Lumin Liu, Hengtao He, Jun Zhang, S. H. Song, Khaled B. Letaief | Published: 2024-05-16
Privacy Protection
Privacy Protection Method
Quantization and Privacy

Learnable Privacy Neurons Localization in Language Models

Authors: Ruizhe Chen, Tianxiang Hu, Yang Feng, Zuozhu Liu | Published: 2024-05-16
LLM Security
Privacy Protection Method
Membership Inference

Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls

Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15
LLM Performance Evaluation
Data Preprocessing
Malware Classification

Cross-Input Certified Training for Universal Perturbations

Authors: Changming Xu, Gagandeep Singh | Published: 2024-05-15 | Updated: 2024-09-09
UAP Training Method
Loss Function
Adversarial Training

Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography

Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15
LLM Performance Evaluation
Domain Independence
Watermark Evaluation

The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks

Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14
Watermarking
Quantification of Uncertainty
Adversarial Training

Differentially Private Federated Learning: A Systematic Review

Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20
Privacy Protection Method
Poisoning
Communication Efficiency