Literature Database

ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Misuse Cases in the Era of Generative AI and Cloud-based Health Information Ecosystem

Authors: Khalid Al-hammuri, Fayez Gebali, Awos Kanan | Published: 2023-11-28
Zero Trust
Advancements in Medical IoT
Watermarking Settings for Medical Data

Scalable Extraction of Training Data from (Production) Language Models

Authors: Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tramèr, Katherine Lee | Published: 2023-11-28
Data Leakage
Training Data Extraction Method
Prompt Injection

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
Watermarking
Data Obfuscation
Watermarking Settings for Medical Data

A Unified Hardware-based Threat Detector for AI Accelerators

Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28
FPGA
Cybersecurity
Model Performance Evaluation

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28
Privacy Protection Method
Membership Inference
Federated Learning

Understanding the Process of Data Labeling in Cybersecurity

Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese | Published: 2023-11-28
Cybersecurity
Challenges of Data Labeling
Expert Opinion Collection

“Do Users fall for Real Adversarial Phishing?” Investigating the Human response to Evasive Webpages

Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese | Published: 2023-11-28
Detection Rate of Phishing Attacks
User Authentication System
Expert Opinion Collection Process

Darknet Traffic Analysis A Systematic Literature Review

Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27
Darknet Traffic Analysis
Machine Learning Method
Communication Analysis

Using Decentralized Aggregation for Federated Learning with Differential Privacy

Authors: Hadeel Abd El-Kareem, Abd El-Moaty Saleh, Ana Fernández-Vilas, Manuel Fernández-Veiga, asser El-Sonbaty | Published: 2023-11-27
Privacy Protection
Poisoning
Experimental Validation

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Authors: Lukas Wutschitz, Boris Köpf, Andrew Paverd, Saravan Rajmohan, Ahmed Salem, Shruti Tople, Santiago Zanella-Béguelin, Menglin Xia, Victor Rühle | Published: 2023-11-27
Security label
Privacy Protection
Information Flow Control