AIセキュリティポータルbot

Model-agnostic clean-label backdoor mitigation in cybersecurity environments

Authors: Giorgio Severi, Simona Boboila, John Holodnak, Kendra Kratkiewicz, Rauf Izmailov, Michael J. De Lucia, Alina Oprea | Published: 2024-07-11 | Updated: 2025-05-05
Backdoor Detection
Backdoor Attack
Defense Mechanism

Explainable Differential Privacy-Hyperdimensional Computing for Balancing Privacy and Transparency in Additive Manufacturing Monitoring

Authors: Fardin Jalil Piran, Prathyush P. Poduval, Hamza Errahmouni Barkam, Mohsen Imani, Farhad Imani | Published: 2024-07-09 | Updated: 2025-03-17
Privacy Protection Method
Privacy Design Principles
Differential Privacy

Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy

Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11
Privacy Protection Method
Loss Function
Optimization Problem

A Geometric Framework for Adversarial Vulnerability in Machine Learning

Authors: Brian Bell | Published: 2024-07-03
Poisoning
Adversarial Example
Literature List

From Theft to Bomb-Making: The Ripple Effect of Unlearning in Defending Against Jailbreak Attacks

Authors: Zhexin Zhang, Junxiao Yang, Yida Lu, Pei Ke, Shiyao Cui, Chujie Zheng, Hongning Wang, Minlie Huang | Published: 2024-07-03 | Updated: 2025-05-20
Prompt Injection
Large Language Model
法執行回避

MALT Powers Up Adversarial Attacks

Authors: Odelia Melamed, Gilad Yehudai, Adi Shamir | Published: 2024-07-02
Mesoscopic Linearity
Attack Method
Evaluation Method

Attack-Aware Noise Calibration for Differential Privacy

Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07
Privacy Protection
Privacy Protection Method
Computational Efficiency

On Discrete Prompt Optimization for Diffusion Models

Authors: Ruochen Wang, Ting Liu, Cho-Jui Hsieh, Boqing Gong | Published: 2024-06-27
Watermarking
Prompt Injection
Prompt Engineering

Diffusion-based Adversarial Purification for Intrusion Detection

Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25
Data Preprocessing
Adversarial Training
Automated Intrusion Detection System

Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness

Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20
Trust Evaluation Module
Evaluation Method
Watermark Evaluation