アルゴリズム

PMark: Towards Robust and Distortion-free Semantic-level Watermarking with Channel Constraints

Authors: Jiahao Huo, Shuliang Liu, Bin Wang, Junyan Zhang, Yibo Yan, Aiwei Liu, Xuming Hu, Mingxun Zhou | Published: 2025-09-25
アルゴリズム
生成AI向け電子透かし
透かし技術の堅牢性

Coherence-driven inference for cybersecurity

Authors: Steve Huntsman | Published: 2025-09-23
アルゴリズム
セキュリティ分析
情報収集手法

Variables Ordering Optimization in Boolean Characteristic Set Method Using Simulated Annealing and Machine Learning-based Time Prediction

Authors: Minzhong Luo, Yudong Sun, Yin Long | Published: 2025-09-18
アルゴリズム
最適化手法
評価手法

Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response

Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17
アルゴリズム
プライバシー分析
差分プライバシー

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
アルゴリズム
安全性メカニズムの分析
透かし

An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks

Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15
アルゴリズム
マルウェア分類
攻撃戦略分析

Inducing Uncertainty for Test-Time Privacy

Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15
アルゴリズム
データキュレーション
モデル評価手法

Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution

Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15
アルゴリズム
脅威モデリング自動化
連合学習

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector

Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11
アルゴリズム
データ収集手法
フィッシング検出

What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets

Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11
アルゴリズム
ネットワークフォレンジックス
異常検知アルゴリズム