文献データベース

A Graph-Based Approach to Alert Contextualisation in Security Operations Centres

Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16
セキュリティ分析
攻撃シナリオ分析
機械学習手法

EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning

Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16
セキュアアグリゲーション
差分プライバシー
敵対的学習

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
アルゴリズム
安全性メカニズムの分析
透かし

A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs

Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16
コード生成手法
バックドアモデルの検知
脆弱性検出手法

Yet Another Watermark for Large Language Models

Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16
プロンプトリーキング
大規模言語モデル
透かし技術

Time-Constrained Intelligent Adversaries for Automation Vulnerability Testing: A Multi-Robot Patrol Case Study

Authors: James C. Ward, Alex Bott, Connor York, Edmund R. Hunt | Published: 2025-09-15
モデル抽出攻撃
攻撃の分類
脆弱性検出手法

NeuroStrike: Neuron-Level Attacks on Aligned LLMs

Authors: Lichao Wu, Sasha Behrouzi, Mohamadreza Rostami, Maximilian Thang, Stjepan Picek, Ahmad-Reza Sadeghi | Published: 2025-09-15
プロンプトインジェクション
大規模言語モデル
安全性メカニズムの分析

An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks

Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15
アルゴリズム
マルウェア分類
攻撃戦略分析

Inducing Uncertainty for Test-Time Privacy

Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15
アルゴリズム
データキュレーション
モデル評価手法

Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution

Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15
アルゴリズム
脅威モデリング自動化
連合学習