Whispering Pixels: Exploiting Uninitialized Register Accesses in Modern GPUs

Authors: Frederik Dermot Pustelnik, Xhani Marvin Saß, Jean-Pierre Seifert | Published: 2024-01-16

The Effect of Intrinsic Dataset Properties on Generalization: Unraveling Learning Differences Between Natural and Medical Images

Authors: Nicholas Konz, Maciej A. Mazurowski | Published: 2024-01-16 | Updated: 2024-02-21

ADVENT: Attack/Anomaly Detection in VANETs

Authors: Hamideh Baharlouei, Adetokunbo Makanju, Nur Zincir-Heywood | Published: 2024-01-16

X Hacking: The Threat of Misguided AutoML

Authors: Rahul Sharma, Sergey Redyuk, Sumantrak Mukherjee, Andrea Sipka, Sebastian Vollmer, David Selby | Published: 2024-01-16 | Updated: 2024-02-12

Towards Efficient and Certified Recovery from Poisoning Attacks in Federated Learning

Authors: Yu Jiang, Jiyuan Shen, Ziyao Liu, Chee Wei Tan, Kwok-Yan Lam | Published: 2024-01-16 | Updated: 2024-01-19

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16

Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications

Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16

ADMIn: Attacks on Dataset, Model and Input. A Threat Model for AI Based Software

Authors: Vimal Kumar, Juliette Mayo, Khadija Bahiss | Published: 2024-01-15

Signed-Prompt: A New Approach to Prevent Prompt Injection Attacks Against LLM-Integrated Applications

Authors: Xuchen Suo | Published: 2024-01-15

Uncertainty-Aware Hardware Trojan Detection Using Multimodal Deep Learning

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2024-01-15 | Updated: 2024-01-23