文献データベース

ACFIX: Guiding LLMs with Mined Common RBAC Practices for Context-Aware Repair of Access Control Vulnerabilities in Smart Contracts

Authors: Lyuye Zhang, Kaixuan Li, Kairan Sun, Daoyuan Wu, Ye Liu, Haoye Tian, Yang Liu | Published: 2024-03-11 | Updated: 2024-03-18
スマートコントラクト
プロンプトインジェクション
自動脆弱性修復

Poisoning Programs by Un-Repairing Code: Security Concerns of AI-generated Code

Authors: Cristina Improta | Published: 2024-03-11
セキュリティ分析
バックドア攻撃
ポイズニング

Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains

Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07
ポイズニング
最適化問題
連合学習

Stealing Part of a Production Language Model

Authors: Nicholas Carlini, Daniel Paleka, Krishnamurthy Dj Dvijotham, Thomas Steinke, Jonathan Hayase, A. Feder Cooper, Katherine Lee, Matthew Jagielski, Milad Nasr, Arthur Conmy, Itay Yona, Eric Wallace, David Rolnick, Florian Tramèr | Published: 2024-03-11 | Updated: 2024-07-09
プロンプトリーキング
モデルの堅牢性
モデル抽出攻撃

DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification

Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko | Published: 2024-03-11
DNN IP保護手法
ウォーターマーキング
モデル性能評価

Fake or Compromised? Making Sense of Malicious Clients in Federated Learning

Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10
バックドア攻撃
ポイズニング
悪意のあるクライアント

Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics

Authors: Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde | Published: 2024-03-10
データセット生成
ライブラリ分類

Fluent: Round-efficient Secure Aggregation for Private Federated Learning

Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10
計算効率
通信効率
連合学習

DP-TabICL: In-Context Learning with Differentially Private Tabular Data

Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08
Few-Shot Learning
プライバシー保護手法
プロンプトインジェクション

EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems

Authors: Kongyang Chen, Yi Lin, Hui Luo, Bing Mi, Yatie Xiao, Chao Ma, Jorge Sá Silva | Published: 2024-03-08
ウォーターマーキング
メンバーシップ推論
防御手法