AIセキュリティポータルbot

Application of BadNets in Spam Filters

Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18
LSTM Model Performance Evaluation
Backdoor Attack
Improvement of Learning

CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection

Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18
Malware Detection Method
Machine Learning Method
Behavior Analysis Method

Discretization-based ensemble model for robust learning in IoT

Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18
Robustness Evaluation
Adversarial Example
Machine Learning Method

Privacy-preserving patient clustering for personalized federated learning

Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17
Variable Extraction Method
Cryptography
Federated Learning

G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts

Authors: Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar | Published: 2023-07-17
Code Change Analysis
Smart Contract
Control Dependency Ordering

Metadata-based Malware Detection on Android using Machine Learning

Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17
Dataset Generation
Malware Detection Method
Machine Learning Method

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17
AUC Evaluation
Security Analysis
Malware Detection with Limited Samples

A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks

Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17
Dataset Generation
Machine Learning Technology
Threat modeling

MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots

Authors: Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu | Published: 2023-07-16 | Updated: 2023-10-25
Data Leakage
Prompt Injection
Watermark Robustness

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15
Dataset Generation
Time Window Analysis
Machine Learning Method