AIセキュリティポータルbot

Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments

Authors: Vishal Karanam | Published: 2023-06-14
Security Analysis
Model Performance Evaluation
Machine Learning Technology

Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization

Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14
Data Protection Method
Privacy Technique
Information Extraction

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON

Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13
Algorithm
Resource Scarcity Issues
Cryptography

Theoretical Foundations of Adversarially Robust Learning

Authors: Omar Montasser | Published: 2023-06-13
Poisoning
Robustness Evaluation
Adversarial Example

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14
APT Defense Techniques
Attack Method
Malware Detection with Limited Samples

Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling

Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13
Data Privacy Assessment
Data Protection Method
Privacy Technique

SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning

Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13
Poisoning
Malicious Client
Federated Learning

Intrusion Detection: A Deep Learning Approach

Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13
LSTM Model Performance Evaluation
Classification Pattern Analysis
Automated Intrusion Detection System

“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter

Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12
Data Privacy Assessment
Hyperparameter Tuning
Privacy Technique

Gaussian Membership Inference Privacy

Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26
Privacy Technique
Hypothesis Testing
Statistical Testing