zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 プライバシー保護プロトコル性能評価手法透かし設計 2025.04.16 文献データベース
Large Language Models are Unreliable for Cyber Threat Intelligence Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16 Few-Shot Learningプロンプトリーキング性能評価手法 2025.03.29 文献データベース
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 RAGへのポイズニング攻撃性能評価手法特徴抽出手法 2025.03.20 2025.04.03 文献データベース
RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16 プライバシー保護プロトコル性能評価手法連合学習 2025.02.13 文献データベース
OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud Authors: Shuai Yuan, Hongwei Li, Xinyuan Qian, Guowen Xu | Published: 2024-09-28 | Updated: 2025-07-21 プライバシーと最適化性能評価手法暗号化手法 2024.09.28 文献データベース
Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21 ネットワーク脅威検出モデル抽出攻撃性能評価手法 2024.01.10 文献データベース
Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31 データ収集手法ネットワークトラフィック分析性能評価手法 2019.05.31 2025.04.03 文献データベース
POPQORN: Quantifying Robustness of Recurrent Neural Networks Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17 ポイズニングモデル評価性能評価手法 2019.05.17 2025.04.03 文献データベース
Simple Black-box Adversarial Attacks Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15 クエリ生成手法性能評価手法敵対的訓練 2019.05.17 2025.04.03 文献データベース
Online Multivariate Anomaly Detection and Localization for High-dimensional Settings Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14 DDoS攻撃性能評価手法高次元データ分析 2019.05.17 2025.04.03 文献データベース