文献データベース

A hierarchical approach for assessing the vulnerability of tree-based classification models to membership inference attack

Authors: Richard J. Preen, Jim Smith | Published: 2025-02-13 | Updated: 2025-06-12
プライバシー保護手法
モデル抽出攻撃
リスク評価

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16
プライバシー保護プロトコル
性能評価手法
連合学習

RESIST: Resilient Decentralized Learning Using Consensus Gradient Descent

Authors: Cheng Fang, Rishabh Dixit, Waheed U. Bajwa, Mert Gurbuzbalaban | Published: 2025-02-11
MITM攻撃
収束分析

Trustworthy AI: Safety, Bias, and Privacy — A Survey

Authors: Xingli Fang, Jianwei Li, Varun Mulchandani, Jung-Eun Kim | Published: 2025-02-11 | Updated: 2025-06-11
バイアス
プロンプトリーキング
差分プライバシー

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLMの応用
リスク分析手法
情報セキュリティ

Membership Inference Risks in Quantized Models: A Theoretical and Empirical Study

Authors: Eric Aubinais, Philippe Formont, Pablo Piantanida, Elisabeth Gassiat | Published: 2025-02-10
メンバーシップ推論
量子化とプライバシー

Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs

Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24
アライメント
プライバシー保護データマイニング
透かし

From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks

Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08
モデル抽出攻撃
モデル抽出攻撃の検知
再構成アルゴリズム

Training Set Reconstruction from Differentially Private Forests: How Effective is DP?

Authors: Alice Gorgé, Julien Ferry, Sébastien Gambs, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08
プライバシーリスク管理
再構成アルゴリズム
差分プライバシー

Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks

Authors: Andreas Happe, Jürgen Cito | Published: 2025-02-06 | Updated: 2025-09-11
インダイレクトプロンプトインジェクション
プロンプトインジェクション
攻撃戦略分析