AI Product Security: A Primer for Developers

Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17

Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives

Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17

Uncharted Territory: Energy Attacks in the Battery-less Internet of Things

Authors: Luca Mottola, Arslan Hameed, Thiemo Voigt | Published: 2023-04-17 | Updated: 2023-07-17

A Randomized Approach for Tight Privacy Accounting

Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21

Few-shot Weakly-supervised Cybersecurity Anomaly Detection

Authors: Rahul Kale, Vrizlynn L. L. Thing | Published: 2023-04-15

Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

Authors: Matouš Kozák, Martin Jureček | Published: 2023-04-14

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses

Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13

Understanding Overfitting in Adversarial Training via Kernel Regression

Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14