Adaptive Differential Privacy in Federated Learning: A Priority-Based Approach

Authors: Mahtab Talaei, Iman Izadi | Published: 2024-01-04

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03

Locally Differentially Private Embedding Models in Distributed Fraud Prevention Systems

Authors: Iker Perez, Jason Wong, Piotr Skalski, Stuart Burrell, Richard Mortier, Derek McAuley, David Sutton | Published: 2024-01-03

User authentication system based on human exhaled breath physics

Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02

Experimental Validation of Sensor Fusion-based GNSS Spoofing Attack Detection Framework for Autonomous Vehicles

Authors: Sagar Dasgupta, Kazi Hassan Shakib, Mizanur Rahman | Published: 2024-01-02

LLbezpeky: Leveraging Large Language Models for Vulnerability Detection

Authors: Noble Saji Mathews, Yelizaveta Brus, Yousra Aafer, Meiyappan Nagappan, Shane McIntosh | Published: 2024-01-02 | Updated: 2024-02-13

PPBFL: A Privacy Protected Blockchain-based Federated Learning Model

Authors: Yang Li, Chunhe Xia, Wanshuang Lin, Tianbo Wang | Published: 2024-01-02 | Updated: 2024-01-08

Detection and Defense Against Prominent Attacks on Preconditioned LLM-Integrated Virtual Assistants

Authors: Chun Fai Chan, Daniel Wankit Yip, Aysan Esmradi | Published: 2024-01-02

A Novel Evaluation Framework for Assessing Resilience Against Prompt Injection Attacks in Large Language Models

Authors: Daniel Wankit Yip, Aysan Esmradi, Chun Fai Chan | Published: 2024-01-02

Facebook Report on Privacy of fNIRS data

Authors: Md Imran Hossen, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Xiali Hei | Published: 2024-01-01