AIセキュリティポータルbot

Toward More Generalized Malicious URL Detection Models

Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09
Token Distribution Analysis
Bias
Impact of Generalization

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
Poisoning
Robustness
Adaptive Adversarial Training

NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks

Authors: Haoyu Liu, Paul Patras | Published: 2022-02-20 | Updated: 2022-04-20
DDoS Attack
Intrusion Detection System
Attack Chain Analysis

Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems

Authors: Nils Müller, Charalampos Ziras, Kai Heussen | Published: 2022-02-18 | Updated: 2023-01-03
Data Collection
Multi-Class Classification
Intrusion Detection System

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20
Data Contamination Detection
Poisoning
Convergence Analysis

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05
Poisoning
Malicious Node Injection
Defense Method

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption

Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14
Algorithm Design
User Authentication System
Cryptographic Protocol

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Authors: Songlei Wang, Yifeng Zheng, Xiaohua Jia | Published: 2022-02-16 | Updated: 2023-01-31
Training Protocol
Privacy Enhancing Protocol
Cryptographic Protocol

Defending against Reconstruction Attacks with Rényi Differential Privacy

Authors: Pierre Stock, Igor Shilov, Ilya Mironov, Alexandre Sablayrolles | Published: 2022-02-15
Privacy Risk Management
Membership Inference
Membership Disclosure Risk

StratDef: Strategic Defense Against Adversarial Attacks in ML-based Malware Detection

Authors: Aqib Rashid, Jose Such | Published: 2022-02-15 | Updated: 2023-04-24
Prompt Injection
Model Selection Method
Defense Method