AIセキュリティポータルbot

ADEPT: A DEbiasing PrompT Framework

Authors: Ke Yang, Charles Yu, Yi Fung, Manling Li, Heng Ji | Published: 2022-11-10 | Updated: 2022-12-23
Bias Detection in AI Output
Prompting Strategy
Creation of Fair AI Models

Stochastic Coded Federated Learning: Theoretical Analysis and Incentive Mechanism Design

Authors: Yuchang Sun, Jiawei Shao, Yuyi Mao, Songze Li, Jun Zhang | Published: 2022-11-08 | Updated: 2023-11-18
Privacy Protection Method
Improvement of Learning
Optimization Methods

Privacy-Aware Compression for Federated Learning Through Numerical Mechanism Design

Authors: Chuan Guo, Kamalika Chaudhuri, Pierre Stock, Mike Rabbat | Published: 2022-11-08 | Updated: 2023-08-10
Privacy Protection Method
Optimization Methods
Computational Efficiency

A Hypergraph-Based Machine Learning Ensemble Network Intrusion Detection System

Authors: Zong-Zhi Lin, Thomas D. Pike, Mark M. Bailey, Nathaniel D. Bastian | Published: 2022-11-08 | Updated: 2024-09-06
Cyber Attack
Model Selection
Improvement of Learning

Unlearning Graph Classifiers with Limited Data Resources

Authors: Chao Pan, Eli Chien, Olgica Milenkovic | Published: 2022-11-06 | Updated: 2023-07-01
Graph Neural Network
Watermarking
Privacy Protection Method

Revisiting Hyperparameter Tuning with Differential Privacy

Authors: Youlong Ding, Xueyang Wu | Published: 2022-11-03 | Updated: 2023-01-31
Hyperparameter Tuning
Privacy Protection Method
Optimization Methods

Amplifying Membership Exposure via Data Poisoning

Authors: Yufei Chen, Chao Shen, Yun Shen, Cong Wang, Yang Zhang | Published: 2022-11-01
Poisoning
Membership Inference
Membership Disclosure Risk

Adversarial Policies Beat Superhuman Go AIs

Authors: Tony T. Wang, Adam Gleave, Tom Tseng, Kellin Pelrine, Nora Belrose, Joseph Miller, Michael D. Dennis, Yawen Duan, Viktor Pogrebniak, Sergey Levine, Stuart Russell | Published: 2022-11-01 | Updated: 2023-07-13
DNN IP Protection Method
Improvement of Learning
Classification of Malicious Actors

Unclonability and Quantum Cryptanalysis: From Foundations to Applications

Authors: Mina Doosti | Published: 2022-10-31
Watermarking
Cryptography
Quantum Information and Quantum Computing

FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices

Authors: Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani | Published: 2022-10-31
Client Contribution Assessment
Model Design and Accuracy
Optimization Methods