文献データベース

Locally Differentially Private In-Context Learning

Authors: Chunyan Zheng, Keke Sun, Wenhao Zhao, Haibo Zhou, Lixin Jiang, Shaoyang Song, Chunlai Zhou | Published: 2024-05-07 | Updated: 2024-05-08
ウォーターマーキング
プライバシー保護手法
プロンプトインジェクション

Explainability-Informed Targeted Malware Misclassification

Authors: Quincy Card, Kshitiz Aryal, Maanak Gupta | Published: 2024-05-07
ポイズニング
マルウェア分類
動的分析

IPFed: Identity protected federated learning for user authentication

Authors: Yosuke Kaga, Yusei Suzuki, Kenta Takahashi | Published: 2024-05-07
プライバシー保護手法
メンバーシップ推論
顔認識システム

Unlearning Backdoor Attacks through Gradient-Based Model Pruning

Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak | Published: 2024-05-07
バックドア攻撃
モデル性能評価

Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management

Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06
物理攻撃
脅威モデリング
防御手法

The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape

Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22
プライバシー保護手法
ポイズニング
メンバーシップ推論

Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid

Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12
セキュリティ分析
マルウェア分類
モデル性能評価

Byzantine-Robust Gossip: Insights from a Dual Approach

Authors: Renaud Gaucher, Hadrien Hendrikx, Aymeric Dieuleveut | Published: 2024-05-06
アルゴリズム
収束保証
収束分析

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03
LLM性能評価
サイバーセキュリティ
データセット生成

Online Clustering of Known and Emerging Malware Families

Authors: Olha Jurečková, Martin Jureček, Mark Stamp | Published: 2024-05-06
オンライン学習
クラスタリング手法
マルウェア分類