AIセキュリティポータルbot

Towards Code Watermarking with Dual-Channel Transformations

Authors: Borui Yang, Wei Li, Liyao Xiang, Bo Li | Published: 2023-09-02 | Updated: 2024-01-02
Data Protection Method
Feature Selection Method
Watermark Robustness

Non-Asymptotic Bounds for Adversarial Excess Risk under Misspecified Models

Authors: Changyu Liu, Yuling Jiao, Junhui Wang, Jian Huang | Published: 2023-09-02
Convergence Property
Loss Term
Adversarial attack

MONDEO: Multistage Botnet Detection

Authors: Duarte Dias, Bruno Sousa, Nuno Antunes | Published: 2023-08-31
Efficiency Evaluation
Unknown Attack Detection
Machine Learning Technology

The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning

Authors: Maria Rigaki, Sebastian Garcia | Published: 2023-08-31
Reinforcement Learning
Malicious Demo Construction
Adversarial attack

Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning

Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30
Interpretation of Topic Models
Classification of Malicious Actors
Machine Learning Technology

Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review

Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen | Published: 2023-08-30 | Updated: 2023-12-25
Energy Management
Prompt Injection
Adversarial Training

Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation

Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26
Data Generation
Privacy Protection Method
Computational Efficiency

Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms

Authors: Azadeh Golduzian | Published: 2023-08-30
DDoS Attack
Machine Learning Method
Feature Interdependence

Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification

Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29
Text Generation Method
Adversarial Training
Adaptive Misuse Detection

On the Steganographic Capacity of Selected Learning Models

Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29
Data Generation
Machine Learning Method
Watermark Robustness