AIセキュリティポータルbot

Defend Data Poisoning Attacks on Voice Authentication

Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07
Model Design
Adversarial Attack Detection
Defense Mechanism

Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification

Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09
Privacy Analysis
Model Design
Communication Model

On Specification-based Cyber-Attack Detection in Smart Grids

Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09
Energy Management
Model Design
Intrusion Detection System

Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis

Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20
DNN IP Protection Method
Model Design
Medical Monitoring System

Differentially Private Stochastic Gradient Descent with Low-Noise

Authors: Puyu Wang, Yunwen Lei, Yiming Ying, Ding-Xuan Zhou | Published: 2022-09-09 | Updated: 2023-07-14
Privacy Analysis
Model Design
Convergence Guarantee

Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting

Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09
IC Counterfeiting Prevention Method
Memory Management Method
Machine Learning

A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning

Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04
DNN IP Protection Method
Privacy Analysis
Model Design

VulCurator: A Vulnerability-Fixing Commit Detector

Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07
Model Design and Accuracy
Model Design
Vulnerability detection

SAGE: Software-based Attestation for GPU Execution

Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07
Secure Communication Channel
Memory Management Method
Adversarial Attack Detection

Classification Protocols with Minimal Disclosure

Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06
Convergence Guarantee
Multi-Party Computation
Machine Learning Method