AIセキュリティポータルbot

Preprint: Privacy-preserving IoT Data Sharing Scheme

Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili | Published: 2022-09-26
IoT Security Risks
Privacy Protection Method
User Authentication System

FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems

Authors: Joel Brogan, Nell Barber, David Cornett, David Bolme | Published: 2022-09-26
Privacy Protection Method
Framework
Face Recognition System

Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy

Authors: Kai Packhäuser, Sebastian Gündel, Florian Thamm, Felix Denzinger, Andreas Maier | Published: 2022-09-23 | Updated: 2023-07-24
Privacy Protection Method
Privacy Assessment
Deep Learning Method

Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models

Authors: Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood | Published: 2022-09-22
Privacy Assessment
Model Extraction Attack
Face Recognition System

You Can’t Hide Behind Your Headset: User Profiling in Augmented and Virtual Reality

Authors: Pier Paolo Tricomi, Federica Nenna, Luca Pajola, Mauro Conti, Luciano Gamberini | Published: 2022-09-22
Dataset Generation
Privacy Assessment
User Authentication System

Talking Trojan: Analyzing an Industry-Wide Disclosure

Authors: Nicholas Boucher, Ross Anderson | Published: 2022-09-22
Open Source Disclosure
Security label
Vulnerability Attack Method

Android Private Compute Core Architecture

Authors: Eugenio Marchiori, Sarah de Haas, Sergey Volnov, Ronnie Falcon, Roxanne Pinto, Marco Zamarato | Published: 2022-09-21 | Updated: 2022-09-22
Privacy Protection
Privacy Technique
Dynamic Access Control

Identifying Emerging Technologies and Leading Companies using Network Dynamics of Patent Clusters: a Cybersecurity Case Study

Authors: Michael Tsesmelis, Ljiljana Dolamic, Marcus Matthias Keupp, Dimitri Percia David, Alain Mermoud | Published: 2022-09-21
Algorithm
Dataset Generation
Evaluation of Technological Novelty

Federated Learning from Pre-Trained Models: A Contrastive Learning Approach

Authors: Yue Tan, Guodong Long, Jie Ma, Lu Liu, Tianyi Zhou, Jing Jiang | Published: 2022-09-21
Framework
Poisoning
Improvement of Learning

Generate rather than Retrieve: Large Language Models are Strong Context Generators

Authors: Wenhao Yu, Dan Iter, Shuohang Wang, Yichong Xu, Mingxuan Ju, Soumya Sanyal, Chenguang Zhu, Michael Zeng, Meng Jiang | Published: 2022-09-21 | Updated: 2023-01-25
RAG
Data Generation Method
Knowledge Extraction Method