AIセキュリティポータルbot

Devising and Detecting Phishing: Large Language Models vs. Smaller Human Models

Authors: Fredrik Heiding, Bruce Schneier, Arun Vishwanath, Jeremy Bernstein, Peter S. Park | Published: 2023-08-23 | Updated: 2023-11-30
Phishing
Phishing Attack
Prompt Injection

ULDP-FL: Federated Learning with Across Silo User-Level Differential Privacy

Authors: Fumiyuki Kato, Li Xiong, Shun Takagi, Yang Cao, Masatoshi Yoshikawa | Published: 2023-08-23 | Updated: 2024-06-16
Privacy Protection
Privacy Protection Method
Federated Learning

Unsupervised anomalies detection in IIoT edge devices networks using federated learning

Authors: Niyomukiza Thamar, Hossam Samy Elsaid Sharara | Published: 2023-08-23
Privacy Protection
Unknown Attack Detection
Federated Learning

Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments

Authors: Maria Rigaki, Ondřej Lukáš, Carlos A. Catania, Sebastian Garcia | Published: 2023-08-23 | Updated: 2023-08-28
LLM Security
Experimental Validation
Reinforcement Learning Environment

Sample Complexity of Robust Learning against Evasion Attacks

Authors: Pascale Gourdeau | Published: 2023-08-23
Sample Complexity
Poisoning
Adversarial Example

Bias-Aware Minimisation: Understanding and Mitigating Estimator Bias in Private SGD

Authors: Moritz Knolle, Robert Dorfman, Alexander Ziller, Daniel Rueckert, Georgios Kaissis | Published: 2023-08-23
Privacy Protection Method
Convergence Analysis
Optimization Methods

Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation

Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22
Backdoor Attack
Poisoning
Defense Method

Optimized Deep Learning Models for Malware Detection under Concept Drift

Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01
Performance Evaluation
Optimization Methods
Deep Learning Method

A Modular and Adaptive System for Business Email Compromise Detection

Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21
Business Email Compromise
Phishing Detection
Performance Evaluation

ALI-DPFL: Differentially Private Federated Learning with Adaptive Local Iterations

Authors: Xinpeng Ling, Jie Fu, Kuncan Wang, Haitao Liu, Zhili Chen | Published: 2023-08-21 | Updated: 2024-05-22
Privacy Protection
Convergence Guarantee
Federated Learning