AIセキュリティポータルbot

SoK: Adversarial Machine Learning Attacks and Defences in Multi-Agent Reinforcement Learning

Authors: Maxwell Standen, Junae Kim, Claudia Szabo | Published: 2023-01-11
DNN IP Protection Method
Adversarial Attack Methods
Structural Attack

Chatbots in a Honeypot World

Authors: Forrest McKee, David Noever | Published: 2023-01-10
Cyber Attack
Honeypot Technology
Program Analysis

Reconstructing Individual Data Points in Federated Learning Hardened with Differential Privacy and Secure Aggregation

Authors: Franziska Boenisch, Adam Dziedzic, Roei Schuster, Ali Shahin Shamsabadi, Ilia Shumailov, Nicolas Papernot | Published: 2023-01-09 | Updated: 2023-04-12
DNN IP Protection Method
Privacy Enhancing Technology
Poisoning

Efficient Attack Detection in IoT Devices using Feature Engineering-Less Machine Learning

Authors: Arshiya Khan, Chase Cotton | Published: 2023-01-09
IoT Device Identification
Prompt Injection
Malicious Package Detection

Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11
Data Privacy Assessment
Privacy Enhancing Technology
Program Analysis

Introducing Model Inversion Attacks on Automatic Speaker Recognition

Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09
Privacy Enhancing Technology
Membership Inference
Speech Synthesis Technology

IronForge: An Open, Secure, Fair, Decentralized Federated Learning

Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07
Privacy Enhancing Technology
Prompt Injection
Reward Mechanism Design

Linear and non-linear machine learning attacks on physical unclonable functions

Authors: Michael Lachner | Published: 2023-01-06
Watermarking
Poisoning
Principle of Optical PUF

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24
Backdoor Attack
Poisoning
Attack Method

DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection

Authors: Caroline Strickland, Chandrika Saha, Muhammad Zakar, Sareh Nejad, Noshin Tasnim, Daniel Lizotte, Anwar Haque | Published: 2023-01-05
DoS Attack
Training Data Generation
Deep Reinforcement Learning