AIセキュリティポータルbot

IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications

Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02
IoT Device Identification
Data Preprocessing
Vulnerability detection

Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation

Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01
Watermarking Settings for Medical Data
Watermark Robustness
Federated Learning

Differentially Private Linear Regression with Linked Data

Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08
Secure Logistic Regression
Data Generation
Privacy Protection Method

Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel

Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03
Data Generation
Vulnerability detection
Quantum Cryptography Technology

Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms

Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01
Adversarial attack
Optimization Methods
Linear Model

Compressed Private Aggregation for Scalable and Robust Federated Learning over Massive Networks

Authors: Natalie Lang, Nir Shlezinger, Rafael G. L. D'Oliveira, Salim El Rouayheb | Published: 2023-08-01 | Updated: 2025-05-08
Scalability Analysis
Privacy Protection Method
Federated Learning

Doubly Robust Instance-Reweighted Adversarial Training

Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01
Adversarial attack
Optimization Methods
Deep Learning Method

A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks

Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31
Data Preprocessing
Adversarial attack
Deep Learning Method

Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection

Authors: Jun Yan, Vikas Yadav, Shiyang Li, Lichang Chen, Zheng Tang, Hai Wang, Vijay Srinivasan, Xiang Ren, Hongxia Jin | Published: 2023-07-31 | Updated: 2024-04-03
LLM Security
System Prompt Generation
Prompt Injection

Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study

Authors: SM Zobaed, Mohsen Amini Salehi | Published: 2023-07-31
TEE Implementation
Software Security
Data Management System