Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification Authors: Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan | Published: 2023-12-13 2023.12.13 2025.04.03 文献データベース
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks Authors: Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan | Published: 2023-12-13 2023.12.13 2025.04.03 文献データベース
Maatphor: Automated Variant Analysis for Prompt Injection Attacks Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12 2023.12.12 2025.04.03 文献データベース
LLMs Perform Poorly at Concept Extraction in Cyber-security Research Literature Authors: Maxime Würsch, Andrei Kucharavy, Dimitri Percia David, Alain Mermoud | Published: 2023-12-12 2023.12.12 2025.04.03 文献データベース
MalPurifier: Enhancing Android Malware Detection with Adversarial Purification against Evasion Attacks Authors: Yuyang Zhou, Guang Cheng, Zongyao Chen, Shui Yu | Published: 2023-12-11 2023.12.11 2025.04.03 文献データベース
Guardians of Trust: Navigating Data Security in AIOps through Vendor Partnerships Authors: Subhadip Kumar | Published: 2023-12-10 | Updated: 2024-01-16 2023.12.10 2025.04.03 文献データベース
Data-Free Hard-Label Robustness Stealing Attack Authors: Xiaojian Yuan, Kejiang Chen, Wen Huang, Jie Zhang, Weiming Zhang, Nenghai Yu | Published: 2023-12-10 | Updated: 2023-12-12 2023.12.10 2025.04.03 文献データベース
Beyond Gradient and Priors in Privacy Attacks: Leveraging Pooler Layer Inputs of Language Models in Federated Learning Authors: Jianwei Li, Sheng Liu, Qi Lei | Published: 2023-12-10 | Updated: 2024-03-15 2023.12.10 2025.04.03 文献データベース
Towards Smart Healthcare: Challenges and Opportunities in IoT and ML Authors: Munshi Saifuzzaman, Tajkia Nuri Ananna | Published: 2023-12-09 | Updated: 2024-01-12 2023.12.09 2025.04.03 文献データベース
Model Extraction Attacks Revisited Authors: Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang | Published: 2023-12-08 2023.12.08 2025.04.03 文献データベース