New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08 Algorithm DesignSecurity AssuranceReinforcement Learning Environment 2023.07.02 2025.05.28 Literature Database
Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16 Security AssuranceData ObfuscationPrivacy Analysis 2023.07.01 2025.05.28 Literature Database
Large Language Models for Code: Security Hardening and Adversarial Testing Authors: Jingxuan He, Martin Vechev | Published: 2023-02-10 | Updated: 2024-08-16 Security AssurancePrompt InjectionVulnerability Analysis 2023.02.10 2025.05.28 Literature Database
RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13 Security AssuranceSoftware SecurityEvaluation Method 2022.12.07 2025.05.28 Literature Database
Targets in Reinforcement Learning to solve Stackelberg Security Games Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30 Algorithm DesignStacking ModelSecurity Assurance 2022.11.30 2025.05.28 Literature Database
BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces Authors: Adam Dorian Wong | Published: 2022-10-12 | Updated: 2022-10-28 DNN IP Protection MethodSecurity AssuranceChallenges of Generative Models 2022.10.12 2025.05.28 Literature Database
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18 Algorithm DesignSecurity AssuranceState Estimation Method 2022.07.18 2025.05.28 Literature Database
DarKnight: An Accelerated Framework for Privacy and Integrity Preserving Deep Learning Using Trusted Hardware Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2022-06-30 DNN IP Protection MethodSecurity AssurancePrivacy Risk Management 2022.06.30 2025.05.28 Literature Database
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 Evaluation Methods for PUFSecurity AssuranceTraining Protocol 2022.06.02 2025.05.28 Literature Database
R-HTDetector: Robust Hardware-Trojan Detection Based on Adversarial Training Authors: Kento Hasegawa, Seira Hidano, Kohei Nozawa, Shinsaku Kiyomoto, Nozomu Togawa | Published: 2022-05-27 Security AssuranceTrojan DetectionFeature Extraction Method 2022.05.27 2025.05.28 Literature Database