AIセキュリティポータルbot

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21
Privacy Protection Method
Fundamentals of Machine Learning
Anomaly Detection Method

ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System

Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20
Cybersecurity
Intrusion Detection System
Attention Mechanism

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20
Backdoor Attack
Attack Type
Explainability

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19
User Behavior Analysis
Attack Type
Machine Learning Method

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte | Published: 2022-04-19 | Updated: 2022-04-21
Application of AI/ML Technologies
Challenges in Analog IC Design
Design Optimization Methods

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18
Algorithm Design
Trojan Detection
Machine Learning Method

Special Session: Towards an Agile Design Methodology for Efficient, Reliable, and Secure ML Systems

Authors: Shail Dave, Alberto Marchisio, Muhammad Abdullah Hanif, Amira Guesmi, Aviral Shrivastava, Ihsen Alouani, Muhammad Shafique | Published: 2022-04-18
Backdoor Attack
Membership Inference
Defense Method

Exploiting Multiple EEG Data Domains with Adversarial Learning

Authors: David Bethge, Philipp Hallgarten, Ozan Özdenizci, Ralf Mikut, Albrecht Schmidt, Tobias Grosse-Puppendahl | Published: 2022-04-16
Dataset evaluation
Machine Learning Method
Generative Adversarial Network

Homomorphic Encryption and Federated Learning based Privacy-Preserving CNN Training: COVID-19 Detection Use-Case

Authors: Febrianti Wibawa, Ferhat Ozgur Catak, Salih Sarp, Murat Kuzlu, Umit Cali | Published: 2022-04-16
Privacy Enhancing Technology
Cryptographic Protocol
Machine Learning Method

Just Fine-tune Twice: Selective Differential Privacy for Large Language Models

Authors: Weiyan Shi, Ryan Shea, Si Chen, Chiyuan Zhang, Ruoxi Jia, Zhou Yu | Published: 2022-04-15 | Updated: 2022-10-27
Privacy Enhancing Technology
Machine Learning Application
Secret Detector