文献データベース

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05
コード変更分析
システム観測性
セキュリティ保証

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
アルゴリズム設計
計算複雑性
透かしの耐久性

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04
データ漏洩
プライバシー侵害
プロンプティング戦略

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04
アルゴリズム設計
データセット生成
データの隠蔽

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04
セキュリティ保証
データ漏洩
メンバーシップ推論

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04
特徴抽出手法
特徴選択手法
計算効率

Learning to Prompt in the Classroom to Understand AI Limits: A pilot study

Authors: Emily Theophilou, Cansu Koyuturk, Mona Yavari, Sathya Bursic, Gregor Donabauer, Alessia Telari, Alessia Testa, Raffaele Boiano, Davinia Hernandez-Leo, Martin Ruskov, Davide Taibi, Alessandro Gabbiadini, Dimitri Ognibene | Published: 2023-07-04 | Updated: 2023-09-01
人工知能の役割
教育やフォローアップ
教育的アプローチ

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
敵対的サンプル
敵対的攻撃
脅威モデリング

Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03
データセット生成
データ整合性制約
機械学習手法

Defending Against Poisoning Attacks in Federated Learning with Blockchain

Authors: Nanqing Dong, Zhipeng Wang, Jiahao Sun, Michael Kampffmeyer, William Knottenbelt, Eric Xing | Published: 2023-07-02 | Updated: 2024-03-12
ポイズニング
投票メカニズム
連合学習