AIセキュリティポータルbot

Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption

Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09
Privacy Protection Mechanism
Encryption Technology
Federated Learning

SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark

Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09
Model DoS
再構成アルゴリズム
評価メトリクス

Are Trees Really Green? A Detection Approach of IoT Malware Attacks

Authors: Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Giacinto | Published: 2025-06-09
IoTネットワーク攻撃
Advancements in Medical IoT
Optimization Strategy

Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability

Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09
Certified Robustness
Robust Optimization
Adversarial Attack Methods

LLM Unlearning Should Be Form-Independent

Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09
Training Method
Certified Robustness
非意味的リダイレクション

“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages

Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09
API Security
Cyber Threat
Information Leakage Analysis

TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems

Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09
データ再構築攻撃
Privacy Enhancing Technology
Membership Inference

MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity

Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09
Cyber Threat
Prompt Injection
マルウェア生成

Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain

Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09
Cyber Threat
Anomaly Detection Algorithm
説明可能な機械学習

Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness

Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09
Information-Theoretic Approach
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques