AIセキュリティポータルbot

Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09
Attack Method
Adversarial Training
Behavior Analysis Method

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09
Watermarking
Cyber Attack
Digital Twin

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09
Dataset Generation
Model Performance Evaluation
Malicious Website Detection

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08
Energy Management
Network Threat Detection
Vulnerability detection

Prompt Injection attack against LLM-integrated Applications

Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02
Prompt Injection
Malicious Prompt

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users

Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06
Poisoning
Multi-Party Computation
Federated Learning

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting

Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12
Privacy Analysis
Membership Inference
Model Architecture

Machine Learning in Digital Forensics: A Systematic Literature Review

Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08
Watermarking
Data Extraction and Analysis
Image Forensics

Flow-based Network Intrusion Detection Based on BERT Masked Language Model

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-06-08
Dataset Generation
Model Design and Accuracy
Intrusion Detection System

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13
Watermarking
Energy Management
Attack Evaluation