性能評価手法

A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models

Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17
IoTデータ分析タスク
性能評価手法
特徴抽出

Network Attack Traffic Detection With Hybrid Quantum-Enhanced Convolution Neural Network

Authors: Zihao Wang, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2025-04-29
性能評価手法
攻撃検出
量子フレームワーク

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
プライバシー保護プロトコル
性能評価手法
透かし設計

Large Language Models are Unreliable for Cyber Threat Intelligence

Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16
Few-Shot Learning
プロンプトリーキング
性能評価手法

DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20
RAGへのポイズニング攻撃
性能評価手法
特徴抽出手法

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16
プライバシー保護プロトコル
性能評価手法
連合学習

OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud

Authors: Shuai Yuan, Hongwei Li, Xinyuan Qian, Guowen Xu | Published: 2024-09-28 | Updated: 2025-07-21
プライバシーと最適化
性能評価手法
暗号化手法

Gotta Detect ‘Em All: Fake Base Station and Multi-Step Attack Detection in Cellular Networks

Authors: Kazi Samin Mubasshir, Imtiaz Karim, Elisa Bertino | Published: 2024-01-10 | Updated: 2025-07-21
ネットワーク脅威検出
モデル抽出攻撃
性能評価手法

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31
データ収集手法
ネットワークトラフィック分析
性能評価手法

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17
ポイズニング
モデル評価
性能評価手法