DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization

Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19

Generative Adversarial Networks Unlearning

Authors: Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou | Published: 2023-08-19

An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity

Authors: Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen | Published: 2023-08-18

Attesting Distributional Properties of Training Data for Machine Learning

Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09

Intrusion Detection based on Federated Learning: a systematic review

Authors: Jose L. Hernandez-Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Marmol, Aurora Gonzalez-Vidal, Georgios Kambourakis | Published: 2023-08-18

Balancing Transparency and Risk: The Security and Privacy Risks of Open-Source Machine Learning Models

Authors: Dominik Hintersdorf, Lukas Struppek, Kristian Kersting | Published: 2023-08-18

A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18

Artificial Intelligence for Web 3.0: A Comprehensive Survey

Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17

An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection

Authors: Arun Kumar Silivery, Kovvur Ram Mohan Rao, L K Suresh Kumar | Published: 2023-08-17

Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service

Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17