Risk Assessment Method

DeepTx: Real-Time Transaction Risk Analysis via Multi-Modal Features and LLM Reasoning

Authors: Yixuan Liu, Xinlei Li, Yi Li | Published: 2025-10-21
UI分析
Risk Assessment Method
Malicious Website Detection

AI Risk-Management Standards Profile for General-Purpose AI (GPAI) and Foundation Models

Authors: Anthony M. Barrett, Jessica Newman, Brandie Nonnecke, Nada Madkour, Dan Hendrycks, Evan R. Murphy, Krystal Jackson, Deepika Raman | Published: 2025-06-30
Model Inversion
Risk Assessment Method
Education and Follow-up

LibVulnWatch: A Deep Assessment Agent System and Leaderboard for Uncovering Hidden Vulnerabilities in Open-Source AI Libraries

Authors: Zekun Wu, Seonglae Cho, Umar Mohammed, Cristian Munoz, Kleyton Costa, Xin Guan, Theo King, Ze Wang, Emre Kazim, Adriano Koshiyama | Published: 2025-05-13 | Updated: 2025-06-30
Indirect Prompt Injection
Risk Assessment Method
依存関係管理

Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13
Privacy Enhancing Technology
Risk Assessment Method
Convergence Property

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05
Data Origins and Evolution
Data Protection Method
Risk Assessment Method

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
Network Slicing
Risk Assessment Method
Adversarial Learning

Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18
Privacy Assessment
Risk Assessment Method
Reinforcement Learning Algorithm

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23
Dataset evaluation
Model Selection Method
Risk Assessment Method

Automated Security Assessment for the Internet of Things

Authors: Xuanyu Duan, Mengmeng Ge, Triet H. M. Le, Faheem Ullah, Shang Gao, Xuequan Lu, M. Ali Babar | Published: 2021-09-09
Risk Assessment Method
Machine Learning
Vulnerability detection

Knowledge mining of unstructured information: application to cyber-domain

Authors: Tuomas Takko, Kunal Bhattacharya, Martti Lehto, Pertti Jalasvirta, Aapo Cederberg, Kimmo Kaski | Published: 2021-09-08 | Updated: 2022-08-01
Risk Assessment Method
Information Extraction Method
Knowledge Graph