文献データベース

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
ウォーターマーキング
暗号学
暗号技術

Deepfakes, Misinformation, and Disinformation in the Era of Frontier AI, Generative AI, and Large AI Models

Authors: Mohamed R. Shoaib, Zefan Wang, Milad Taleby Ahvanooey, Jun Zhao | Published: 2023-11-29
AIと自動化の役割
コンテンツモデレーション
プライバシー保護

ZTCloudGuard: Zero Trust Context-Aware Access Management Framework to Avoid Misuse Cases in the Era of Generative AI and Cloud-based Health Information Ecosystem

Authors: Khalid Al-hammuri, Fayez Gebali, Awos Kanan | Published: 2023-11-28
ゼロトラスト
医療IoTの進展
医療データの透かし設定

Scalable Extraction of Training Data from (Production) Language Models

Authors: Milad Nasr, Nicholas Carlini, Jonathan Hayase, Matthew Jagielski, A. Feder Cooper, Daphne Ippolito, Christopher A. Choquette-Choo, Eric Wallace, Florian Tramèr, Katherine Lee | Published: 2023-11-28
データ漏洩
トレーニングデータ抽出手法
プロンプトインジェクション

De-identification of clinical free text using natural language processing: A systematic review of current approaches

Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28
ウォーターマーキング
データの隠蔽
医療データの透かし設定

A Unified Hardware-based Threat Detector for AI Accelerators

Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28
FPGA
サイバーセキュリティ
モデル性能評価

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28
プライバシー保護手法
メンバーシップ推論
連合学習

Understanding the Process of Data Labeling in Cybersecurity

Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese | Published: 2023-11-28
サイバーセキュリティ
データラベリングの課題
専門家の意見収集

“Do Users fall for Real Adversarial Phishing?” Investigating the Human response to Evasive Webpages

Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese | Published: 2023-11-28
フィッシング攻撃の検出率
ユーザー認証システム
専門家の意見収集プロセス

Darknet Traffic Analysis A Systematic Literature Review

Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27
ダークネットトラフィック分析
機械学習手法
通信解析