AIセキュリティポータルbot

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07
Protocol Performance Evaluation
Malware Detection Method
Feature Extraction Method

SCART: Simulation of Cyber Attacks for Real-Time

Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07
Data Generation
Threat modeling
Operational Scenario

AI Model Disgorgement: Methods and Choices

Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07
DNN IP Protection Method
Watermarking
Data Generation

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15
Privacy Analysis
Privacy Technique
Attack Evaluation

Reliable learning in challenging environments

Authors: Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma | Published: 2023-04-06 | Updated: 2023-10-29
Robustness
Optimization Problem
Funding

Inductive Graph Unlearning

Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07
Graph Neural Network
Clustering methods
Experimental Validation

IoT Federated Blockchain Learning at the Edge

Authors: James Calo, Benny Lo | Published: 2023-04-06
Cloud Computing
Threats of Medical AI
Machine Learning Technology

When approximate design for fast homomorphic computation provides differential privacy guarantees

Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06
Watermarking
Privacy Enhancing Technology
Machine Learning Method

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
Security Analysis
Threat modeling
Vulnerability Mitigation Technique

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18
Graph Neural Network
Backdoor Attack
Feature Selection Method