AIセキュリティポータルbot

Accuracy Improvement in Differentially Private Logistic Regression: A Pre-training Approach

Authors: Mohammad Hoseinpour, Milad Hoseinpour, Ali Aghagolzadeh | Published: 2023-07-25 | Updated: 2024-02-12
Data Privacy Assessment
Improvement of Learning

Malware Resistant Data Protection in Hyper-connected Networks: A survey

Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24
Cybersecurity
Malware Propagation Means
Classification of Malicious Actors

Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations

Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27
Attack Method
Adversarial Example
Physical attack

A Differentially Private Weighted Empirical Risk Minimization Procedure and its Application to Outcome Weighted Learning

Authors: Spencer Giddens, Yiwang Zhou, Kevin R. Krull, Tara M. Brinkman, Peter X. K. Song, Fang Liu | Published: 2023-07-24 | Updated: 2024-09-27
Data Privacy Assessment
Watermarking Settings for Medical Data
Optimization Problem

Getting pwn’d by AI: Penetration Testing with Large Language Models

Authors: Andreas Happe, Jürgen Cito | Published: 2023-07-24 | Updated: 2023-08-17
LLM Security
Prompt Injection
Penetration Testing Methods

Maximal Information Leakage from Quantum Encoding of Classical Data

Authors: Farhad Farokhi | Published: 2023-07-24 | Updated: 2024-01-02
Data Privacy Assessment
Information Gathering Methods
Quantum Cryptography Technology

Security and Privacy Issues of Federated Learning

Authors: Jahid Hasan | Published: 2023-07-22
Poisoning
Membership Inference
Federated Learning

Global Differential Privacy for Distributed Metaverse Healthcare Systems

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20
Watermarking
Data Protection Method
Machine Learning Method

Digital Healthcare in The Metaverse: Insights into Privacy and Security

Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10
Data Protection Method
Backdoor Attack
Privacy Risk Management

The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention

Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21
Data Generation
Prompt Injection
Analysis of Detection Methods