On the Vulnerability of Deep Automatic Modulation Classifiers to Explainable Backdoor Threats Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 データ毒性Backdoor AttackAttackers and Malicious Devices 2026.03.26 2026.03.28 Literature Database
Mitigating Evasion Attacks in Fog Computing Resource Provisioning Through Proactive Hardening Authors: Younes Salmi, Hanna Bogucka | Published: 2026-03-26 Proactive DefenseAttackers and Malicious Devices評価メトリクス 2026.03.26 2026.03.28 Literature Database
Invisible Threats from Model Context Protocol: Generating Stealthy Injection Payload via Tree-based Adaptive Search Authors: Yulin Shen, Xudong Pan, Geng Hong, Min Yang | Published: 2026-03-25 Phishing AttackPrompt InjectionAttackers and Malicious Devices 2026.03.25 2026.03.26 Literature Database
Toward a Multi-Layer ML-Based Security Framework for Industrial IoT Authors: Aymen Bouferroum, Valeria Loscri, Abderrahim Benslimane | Published: 2026-03-25 IoT Security FrameworkAttackers and Malicious Devices評価基準 2026.03.25 2026.03.26 Literature Database
The Cognitive Firewall:Securing Browser Based AI Agents Against Indirect Prompt Injection Via Hybrid Edge Cloud Defense Authors: Qianlong Lan, Anuj Kaul | Published: 2026-03-24 Indirect Prompt InjectionProactive DefenseAttackers and Malicious Devices 2026.03.24 2026.03.26 Literature Database
Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27 Dataset GenerationLink EmulationAttackers and Malicious Devices 2022.07.28 2025.05.28 Literature Database
You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26 Privacy LeakageLoss FunctionAttackers and Malicious Devices 2022.04.26 2025.05.28 Literature Database
LEGATO: A LayerwisE Gradient AggregaTiOn Algorithm for Mitigating Byzantine Attacks in Federated Learning Authors: Kamala Varma, Yi Zhou, Nathalie Baracaldo, Ali Anwar | Published: 2021-07-26 PoisoningAttackers and Malicious DevicesFederated Learning 2021.07.26 2025.05.28 Literature Database
Policy Poisoning in Batch Reinforcement Learning and Control Authors: Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu | Published: 2019-10-13 | Updated: 2019-10-31 Reinforcement Learning EnvironmentAttack EvaluationAttackers and Malicious Devices 2019.10.13 2025.05.28 Literature Database
Membership Model Inversion Attacks for Deep Networks Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09 Attack EvaluationAttackers and Malicious DevicesGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database