文献データベース

On the Security and Privacy of Federated Learning: A Survey with Attacks, Defenses, Frameworks, Applications, and Future Directions

Authors: Daniel M. Jimenez-Gutierrez, Yelizaveta Falkouskaya, Jose L. Hernandez-Ramos, Aris Anagnostopoulos, Ioannis Chatzigiannakis, Andrea Vitaletti | Published: 2025-08-19
プライバシー設計原則
ポイズニング
毒データの検知

DDoS Attacks in Cloud Computing: Detection and Prevention

Authors: Zain Ahmad, Musab Ahmad, Bilal Ahmad | Published: 2025-08-19
リソース使用分析
攻撃タイプ
防御手法

AutoBnB-RAG: Enhancing Multi-Agent Incident Response with Retrieval-Augmented Generation

Authors: Zefang Liu, Arman Anwar | Published: 2025-08-18
RAG
プロトコル手順
マルチエージェントシステム

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
アルゴリズム設計
ハードウェアセキュリティ
脆弱性管理

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18
アルゴリズム設計
プロンプトインジェクション
攻撃タイプ

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
ハードウェアセキュリティ
知識グラフ推論
脆弱性管理

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
アルゴリズム設計
プライバシー設計原則
透かし設計

Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes

Authors: Zilong Lin, Zichuan Li, Xiaojing Liao, XiaoFeng Wang | Published: 2025-08-18
LLMの安全機構の解除
データ生成手法
出力の有害度の算出

UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks

Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18
UAV個体識別
パフォーマンス評価
透かし評価

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
プロンプトインジェクション
攻撃チェーン分析
脆弱性評価手法