文献データベース

A Privacy-Preserving Federated Learning Approach for Kernel methods

Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05
MPCアルゴリズム
プライバシー保護技術
透かし評価

Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia

Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05
LLMの応用
サイバー攻撃
倫理的ガイドライン遵守

Poisoning Network Flow Classifiers

Authors: Giorgio Severi, Simona Boboila, Alina Oprea, John Holodnak, Kendra Kratkiewicz, Jason Matterer | Published: 2023-06-02
バックドア攻撃
ポイズニング
敵対的攻撃

Hyperparameter Learning under Data Poisoning: Analysis of the Influence of Regularization via Multiobjective Bilevel Optimization

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2023-06-02 | Updated: 2023-06-23
ポイズニング
攻撃の評価
正則化

PassGPT: Password Modeling and (Guided) Generation with Large Language Models

Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14
LLMの応用
モデルの設計や精度
透かし評価

A Closer Look at the Adversarial Robustness of Deep Equilibrium Models

Authors: Zonghan Yang, Tianyu Pang, Yang Liu | Published: 2023-06-02
ロバスト性に関する評価
敵対的攻撃
適応型敵対的訓練

Adaptive Attractors: A Defense Strategy against ML Adversarial Collusion Attacks

Authors: Jiyi Zhang, Han Fang, Ee-Chien Chang | Published: 2023-06-02
攻撃の評価
敵対的攻撃
透かし評価

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking

Authors: Junchuan Liang, Rong Wang | Published: 2023-06-02
プライバシー保護技術
知的財産保護
透かし評価

DeepfakeArt Challenge: A Benchmark Dataset for Generative AI Art Forgery and Data Poisoning Detection

Authors: Hossein Aboutalebi, Dayou Mao, Rongqi Fan, Carol Xu, Chris He, Alexander Wong | Published: 2023-06-02 | Updated: 2024-05-23
データセット生成
知的財産保護
透かし評価

Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features

Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22
セキュリティ分析
マルウェア検出シナリオ
評価メトリクス