Security Analysis

LLM Security Guard for Code

Authors: Arya Kavian, Mohammad Mehdi Pourhashem Kallehbasti, Sajjad Kazemi, Ehsan Firouzi, Mohammad Ghafari | Published: 2024-05-02 | Updated: 2024-05-03
LLM Security
Security Analysis
Prompt Injection

Guardians of the Quantum GAN

Authors: Archisman Ghosh, Debarshi Kundu, Avimita Chatterjee, Swaroop Ghosh | Published: 2024-04-24 | Updated: 2024-05-15
Watermarking
Security Analysis
Quantum Framework

An Investigation into Misuse of Java Security APIs by Large Language Models

Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04
Misuse of Security API
Security Analysis
Prompt Injection

LightFAt: Mitigating Control-flow Explosion via Lightweight PMU-based Control-flow Attestation

Authors: Jeferson Gonzalez-Gomez, Hassan Nassar, Lars Bauer, Jorg Henkel | Published: 2024-04-03 | Updated: 2024-04-04
Watermarking
Security Analysis
Anomaly Detection Method

Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks

Authors: Zahir Alsulaimawi | Published: 2024-03-15
Scalability Analysis
Security Analysis
Federated Learning

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
Security Analysis
Backdoor Attack
Poisoning

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01
Security Analysis
Poisoning
Transfer Learning

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14
Cybersecurity
Security Analysis
Advancements in Medical IoT

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12
Cybersecurity
Security Analysis
Physical layer security

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning

Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11
Watermarking
Security Analysis
Watermark Evaluation