Security Analysis

QuMoS: A Framework for Preserving Security of Quantum Machine Learning Model

Authors: Zhepeng Wang, Jinyang Li, Zhirui Hu, Blake Gage, Elizabeth Iwasawa, Weiwen Jiang | Published: 2023-04-23 | Updated: 2023-10-13
Security Analysis
Optimization Methods
Quantization and Privacy

How Secure is Code Generated by ChatGPT?

Authors: Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Published: 2023-04-19
Security Analysis
Program Verification
Vulnerability Prediction

AI Product Security: A Primer for Developers

Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18
Security Analysis
Privacy Technique
Compliance with Ethical Guidelines

Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives

Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17
Energy-Based Model
Security Analysis
Privacy Technique

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses

Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13
Security Analysis
Dataset Generation
Natural Language Processing

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24
Watermarking
Security Analysis
Privacy Technique

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
Security Analysis
Performance Evaluation
Machine Learning Technology

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
Security Analysis
Threat modeling
Vulnerability Mitigation Technique

A Multiagent CyberBattleSim for RL Cyber Operation Agents

Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03
Security Analysis
Network Threat Detection
Educational CTF

Graph Mining for Cybersecurity: A Survey

Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16
Graph Embedding
Graph Construction
Security Analysis