AIセキュリティポータルbot

Machine Learning-Based Security Policy Analysis

Authors: Krish Jain, Joann Sum, Pranav Kapoor, Amir Eaman | Published: 2024-12-30 | Updated: 2025-01-06
SELinux Policy Anomaly Detection

ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation

Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07
Text Perturbation Method
Backdoor Detection
Watermarking Technology

Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense

Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15
Prompt leaking
Model DoS
Information Security

Robust Matrix Completion for Discrete Rating-Scale Data

Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30
Algorithm
Simulation Result Evaluation

SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity

Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06
LLM Performance Evaluation
Cybersecurity
Prompt Injection

A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis

Authors: Narasimha Raghavan Veeraragavan, Svetlana Boudko, Jan Franz Nygård | Published: 2024-12-29
Kaplan-Meier Estimation
Privacy Protection
Cryptography

Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness

Authors: Olukorede Fakorede, Modeste Atsague, Jin Tian | Published: 2024-12-27
Adversarial Example
Adversarial Training

CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers

Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31
LLM Security
Backdoor Attack
Vulnerability of Adversarial Examples

Detection and classification of DDoS flooding attacks by machine learning method

Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02
Cybersecurity
Network Threat Detection

Fundamental Limits in the Search for Less Discriminatory Algorithms — and How to Avoid Them

Authors: Benjamin Laufer, Manisch Raghavan, Solon Barocas | Published: 2024-12-24
Bias
Limitations of Non-Discriminatory Algorithms