文献データベース

Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption

Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09
プライバシー保護メカニズム
暗号化技術
連合学習

SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark

Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09
モデルDoS
再構成アルゴリズム
評価メトリクス

Are Trees Really Green? A Detection Approach of IoT Malware Attacks

Authors: Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Giacinto | Published: 2025-06-09
IoTネットワーク攻撃
医療IoTの進展
最適化戦略

Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability

Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09
モデルの頑健性保証
ロバスト最適化
敵対的攻撃手法

LLM Unlearning Should Be Form-Independent

Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09
トレーニング手法
モデルの頑健性保証
非意味的リダイレクション

“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages

Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09
APIセキュリティ
サイバー脅威
情報漏洩分析

TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems

Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09
データ再構築攻撃
プライバシー保護技術
メンバーシップ推論

MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity

Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09
サイバー脅威
プロンプトインジェクション
マルウェア生成

Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain

Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09
サイバー脅威
異常検知アルゴリズム
説明可能な機械学習

Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness

Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09
情報理論的アプローチ
生成AI向け電子透かし
透かし技術の堅牢性