AIセキュリティポータルbot

Are aligned neural networks adversarially aligned?

Authors: Nicholas Carlini, Milad Nasr, Christopher A. Choquette-Choo, Matthew Jagielski, Irena Gao, Anas Awadalla, Pang Wei Koh, Daphne Ippolito, Katherine Lee, Florian Tramer, Ludwig Schmidt | Published: 2023-06-26 | Updated: 2024-05-06
Prompt Injection
Adversarial Example
Adversarial Attack Methods

Private Federated Learning in Gboard

Authors: Yuanbo Zhang, Daniel Ramage, Zheng Xu, Yanxiang Zhang, Shumin Zhai, Peter Kairouz | Published: 2023-06-26
Privacy Protection
Federated Learning

On the Resilience of Machine Learning-Based IDS for Automotive Networks

Authors: Ivo Zenden, Han Wang, Alfonso Iacovazzi, Arash Vahidi, Rolf Blom, Shahid Raza | Published: 2023-06-26
Malware Detection Method
Adversarial Attack Methods
Vehicle Network

Ensemble of Random and Isolation Forests for Graph-Based Intrusion Detection in Containers

Authors: Alfonso Iacovazzi, Shahid Raza | Published: 2023-06-26
Dataset Generation
Data Collection
Malware Detection Method

PWSHAP: A Path-Wise Explanation Model for Targeted Variables

Authors: Lucile Ter-Minassian, Oscar Clivio, Karla Diaz-Ordaz, Robin J. Evans, Chris Holmes | Published: 2023-06-26
Robustness Evaluation
Causal Interpretation
Local Mediation Effect

ChatIDS: Explainable Cybersecurity Using Generative AI

Authors: Victor Jüttner, Martin Grimmer, Erik Buchmann | Published: 2023-06-26
Online Safety Advice
Prompt Injection
Expert Opinion Collection

Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices

Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08
Malware Detection Method
Feature Extraction Method
Natural Language Processing

Steganographic Capacity of Deep Learning Models

Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25
Data Obfuscation
Malware Classification
Information Hiding Techniques

Locally Differentially Private Distributed Online Learning with Guaranteed Optimality

Authors: Ziqin Chen, Yongqiang Wang | Published: 2023-06-25 | Updated: 2024-08-23
Algorithm Design
Privacy Protection
Convergence Guarantee

Federated Learning Approach for Distributed Ransomware Analysis

Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25
Malware Classification
Malware Detection Method
Federated Learning