AIセキュリティポータルbot

The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs

Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15
URL analysis techniques
Phishing Detection
Deep Learning Method

Layered Uploading for Quantum Convolutional Neural Networks

Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13
Model Design
Loss Function
Machine Learning Technology

Federated Learning on Riemannian Manifolds with Differential Privacy

Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15
Watermarking
Privacy Protection Method
Convergence Analysis

Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection

Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15
Data Preprocessing
Privacy Protection
Threats of Medical AI

Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15
DDoS Attack Detection
Attack Method
Adversarial Example

Privacy at a Price: Exploring its Dual Impact on AI Fairness

Authors: Mengmeng Yang, Ming Ding, Youyang Qu, Wei Ni, David Smith, Thierry Rakotoarivelo | Published: 2024-04-15
Privacy Protection
Privacy Protection Method
Fairness evaluation

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14
Watermarking
Training Protocol
Privacy Protection Method

Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach

Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13
FPGA
Resource optimization
Computational Efficiency

Multimodal Attack Detection for Action Recognition Models

Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13
DoS Mitigation
Adversarial Training
Defense Method

Empowering Malware Detection Efficiency within Processing-in-Memory Architecture

Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12
Watermarking
Malware Classification
Computational Efficiency