AIセキュリティポータルbot

FL-Defender: Combating Targeted Attacks in Federated Learning

Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02
Attack Methods against DFL
Algorithm Design
Poisoning

Firenze: Model Evaluation Using Weak Signals

Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02
Data Generation
Model Interpretability
Evaluation Method

The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act

Authors: Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly | Published: 2022-07-01
Cybersecurity
Risk Management
Artificial Intelligence Regulation

Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks

Authors: Ignjat Pejic, Rui Wang, Kaitai Liang | Published: 2022-07-01
Future Research
Encryption Method
Challenges of Generative Models

When Does Differentially Private Learning Not Suffer in High Dimensions?

Authors: Xuechen Li, Daogao Liu, Tatsunori Hashimoto, Huseyin A. Inan, Janardhan Kulkarni, Yin Tat Lee, Abhradeep Guha Thakurta | Published: 2022-07-01 | Updated: 2022-10-26
Algorithm Design
Sample Complexity
Privacy Risk Management

Threat Assessment in Machine Learning based Systems

Authors: Lionel Nganyewou Tidjon, Foutse Khomh | Published: 2022-06-30
Risk Management
Attacker Behavior Analysis
Threat Model

DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30
DNN IP Protection Method
Security Assurance
Privacy Risk Management

IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31
Algorithm Design
Efficient Proof System
Adversarial Learning

Private Graph Extraction via Feature Explanations

Authors: Iyiola E. Olatunji, Mandeep Rathee, Thorben Funke, Megha Khosla | Published: 2022-06-29 | Updated: 2023-11-02
Attack Methods against DFL
Privacy Risk Management
Adversarial Learning

Current Challenges of Cyber Threat and Vulnerability Identification Using Public Enumerations

Authors: Lukáš Sadlek, Pavel Čeleda, Daniel Tovarňák | Published: 2022-06-29
Cyber Threat
Software Security
Vulnerability Management