Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15 Prompt leakingModel DoSInformation Security 2024.12.30 2025.05.27 Literature Database
TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments Authors: Joshua Groen, Simone Di Valerio, Imtiaz Karim, Davide Villa, Yiewi Zhang, Leonardo Bonati, Michele Polese, Salvatore D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik Chowdhury | Published: 2024-12-17 | Updated: 2025-11-06 Spoofing Attack AnalysisInformation Security機械学習による攻撃検出 2024.12.17 2025.11.08 Literature Database
FTSmartAudit: A Knowledge Distillation-Enhanced Framework for Automated Smart Contract Auditing Using Fine-Tuned LLMs Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Zhe Hou | Published: 2024-10-17 | Updated: 2025-11-03 Bias Detection in AI OutputAutomation of CybersecurityInformation Security 2024.10.17 2025.11.05 Literature Database
A Chatbot for Information Security Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01 Abuse of AI ChatbotsAdvice ProvisionInformation Security 2020.12.01 2025.05.28 Literature Database
S3ML: A Secure Serving System for Machine Learning Inference Authors: Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao | Published: 2020-10-13 SGX Application DevelopmentInformation SecurityMachine Learning 2020.10.13 2025.05.28 Literature Database
Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper) Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12 Information SecurityThreat Model 2020.10.12 2025.05.28 Literature Database
Detection of Iterative Adversarial Attacks via Counter Attack Authors: Matthias Rottmann, Kira Maag, Mathis Peyron, Natasa Krejic, Hanno Gottschalk | Published: 2020-09-23 | Updated: 2021-03-23 RobustnessInformation SecuritySelection and Evaluation of Optimization Algorithms 2020.09.23 2025.05.28 Literature Database
FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning Authors: Swanand Kadhe, Nived Rajaraman, O. Ozan Koyluoglu, Kannan Ramchandran | Published: 2020-09-23 Privacy Enhancing TechnologyInformation SecurityCommunication Efficiency 2020.09.23 2025.05.28 Literature Database
Phishing Detection Using Machine Learning Techniques Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20 Performance EvaluationMalicious Website DetectionInformation Security 2020.09.20 2025.05.28 Literature Database
Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11 WatermarkingData Extraction and AnalysisInformation Security 2020.08.11 2025.05.28 Literature Database