AIセキュリティポータルbot

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation

A Natural Language Processing Approach to Malware Classification

Authors: Ritik Mehta, Olha Jurečková, Mark Stamp | Published: 2023-07-07
Malware Classification Using CNN
Malware Detection Method
Efficient Resolution of Learning Tasks

Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation

Authors: Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong | Published: 2023-07-05
Control Action Generation
Vehicle Network
Federated Learning

Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05
Security Assurance
Prompt Injection
Adversarial Attack Methods

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05
Code Change Analysis
System Observability
Security Assurance

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
Algorithm Design
Computational Complexity
Watermark Robustness

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04
Data Leakage
Privacy Violation
Prompting Strategy

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04
Algorithm Design
Dataset Generation
Data Obfuscation

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04
Security Assurance
Data Leakage
Membership Inference

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04
Feature Extraction Method
Feature Selection Method
Computational Efficiency