AIセキュリティポータルbot

Certified private data release for sparse Lipschitz functions

Authors: Konstantin Donhauser, Johan Lokna, Amartya Sanyal, March Boedihardjo, Robert Hönig, Fanny Yang | Published: 2023-02-19 | Updated: 2023-08-28
Watermarking
Privacy Enhancing Technology
Model Performance Evaluation

Attacks in Adversarial Machine Learning: A Systematic Survey from the Life-cycle Perspective

Authors: Baoyuan Wu, Zihao Zhu, Li Liu, Qingshan Liu, Zhaofeng He, Siwei Lyu | Published: 2023-02-19 | Updated: 2024-01-04
Backdoor Attack
Prompt Injection
Poisoning Attack

Marich: A Query-efficient Distributionally Equivalent Model Extraction Attack using Public Data

Authors: Pratik Karmakar, Debabrota Basu | Published: 2023-02-16 | Updated: 2023-10-18
Privacy Enhancing Technology
Model Performance Evaluation
Model Extraction Attack

Large Language Models for Code: Security Hardening and Adversarial Testing

Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16
Security Assurance
Prompt Injection
Vulnerability Analysis

Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19
Hyperparameter Tuning
Poisoning Attack
Membership Inference

Continuous Learning for Android Malware Detection

Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14
Online Learning
Poisoning
Model Performance Evaluation

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23
Code Generation
Prompt Injection
Vulnerability Analysis

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06
DNN IP Protection Method
Poisoning Attack
Threat modeling

SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21
DNN IP Protection Method
Poisoning
Poisoning Attack

Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation

Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14
DNN IP Protection Method
Watermarking
Model Performance Evaluation