AIセキュリティポータルbot

Towards Automated Classification of Attackers’ TTPs by combining NLP with ML Techniques

Authors: Clemens Sauerwein, Alexander Pfohl | Published: 2022-07-18
Text Extraction Method
Training Data Generation
Information Hiding Techniques

Security and Safety Aspects of AI in Industry Applications

Authors: Hans Dermot Doran | Published: 2022-07-16
Security Analysis
Training Protocol
Model Architecture

Sotto Voce: Federated Speech Recognition with Differential Privacy Guarantees

Authors: Michael Shoemate, Kevin Jett, Ethan Cowan, Sean Colbath, James Honaker, Prasanna Muthukumar | Published: 2022-07-16
Privacy Protection Method
Information-Theoretic Privacy
Speech Recognition Process

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15
Algorithm Design
Privacy Protection Method
Trust Evaluation Module

Mobile Keystroke Biometrics Using Transformers

Authors: Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales | Published: 2022-07-15 | Updated: 2022-10-04
Algorithm Design
System Observability
Simulation Result Evaluation

Suppressing Poisoning Attacks on Federated Learning for Medical Imaging

Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15
Byzantine Resilience
Poisoning Attack
Computational Efficiency

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13
Model Performance Evaluation
Intrusion Detection System
Transparency and Verification

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14
Algorithm Design
Data Selection Strategy
Model Performance Evaluation

Game of Trojans: A Submodular Byzantine Approach

Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13
Algorithm Design
Model Performance Evaluation
Strategic Game