AIセキュリティポータルbot

An Efficient Multi-Step Framework for Malware Packing Identification

Authors: Jong-Wouk Kim, Yang-Sae Moon, Mi-Jung Choi | Published: 2022-08-17
Program Analysis
Malware Propagation Means
Dynamic Analysis

FedPerm: Private and Robust Federated Learning by Parameter Permutation

Authors: Hamid Mozaffari, Virendra J. Marathe, Dave Dice | Published: 2022-08-16
Privacy Risk Management
Poisoning
Communication Efficiency

CTI4AI: Threat Intelligence Generation and Sharing after Red Teaming AI Models

Authors: Chuyen Nguyen, Caleb Morgan, Sudip Mittal | Published: 2022-08-16
Relationship of AI Systems
Attack Detection
Vulnerability detection

Deception for Cyber Defence: Challenges and Opportunities

Authors: David Liebowitz, Surya Nepal, Kristen Moore, Cody J. Christopher, Salil S. Kanhere, David Nguyen, Roelien C. Timmer, Michael Longland, Keerth Rathakumar | Published: 2022-08-15
Cybersecurity
Attack Method
Machine Learning Technology

Long-Short History of Gradients is All You Need: Detecting Malicious and Unreliable Clients in Federated Learning

Authors: Ashish Gupta, Tie Luo, Mao V. Ngo, Sajal K. Das | Published: 2022-08-14
Malicious Node Detection
Attack Detection
Threat modeling

Practical Vertical Federated Learning with Unsupervised Representation Learning

Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13
Data Protection Method
Privacy Risk Management
Communication Efficiency

Unifying Gradients to Improve Real-world Robustness for Deep Networks

Authors: Yingwen Wu, Sizhe Chen, Kun Fang, Xiaolin Huang | Published: 2022-08-12 | Updated: 2023-08-24
Robustness Evaluation
Performance Evaluation Metrics
Attack Method

A Knowledge Distillation-Based Backdoor Attack in Federated Learning

Authors: Yifan Wang, Wei Fan, Keke Yang, Naji Alhusaini, Jing Li | Published: 2022-08-12
Backdoor Attack
Knowledge Distillation

Analysis, Detection, and Classification of Android Malware using System Calls

Authors: Shubham Shakya, Mayank Dave | Published: 2022-08-12
Malware Classification
Malware Detection Method
Attack Method

Shielding Federated Learning Systems against Inference Attacks with ARM TrustZone

Authors: Aghiles Ait Messaoud, Sonia Ben Mokhtar, Vlad Nitu, Valerio Schiavoni | Published: 2022-08-11 | Updated: 2022-10-15
Client-Side Defense
Poisoning
Attack Method