情報セキュリティ

Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense

Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15
プロンプトリーキング
モデルDoS
情報セキュリティ

TIMESAFE: Timing Interruption Monitoring and Security Assessment for Fronthaul Environments

Authors: Joshua Groen, Simone Di Valerio, Imtiaz Karim, Davide Villa, Yiewi Zhang, Leonardo Bonati, Michele Polese, Salvatore D'Oro, Tommaso Melodia, Elisa Bertino, Francesca Cuomo, Kaushik Chowdhury | Published: 2024-12-17 | Updated: 2025-11-06
スプーフィング攻撃分析
情報セキュリティ
機械学習による攻撃検出

FTSmartAudit: A Knowledge Distillation-Enhanced Framework for Automated Smart Contract Auditing Using Fine-Tuned LLMs

Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Xianhao Zhang, Zhe Hou | Published: 2024-10-17 | Updated: 2025-11-03
AIによる出力のバイアスの検出
サイバーセキュリティの自動化
情報セキュリティ

A Chatbot for Information Security

Authors: Sofian Hamad, Taoufik Yeferny | Published: 2020-12-01
AIチャットボットの悪用
アドバイス提供
情報セキュリティ

S3ML: A Secure Serving System for Machine Learning Inference

Authors: Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao | Published: 2020-10-13
SGXアプリケーション開発
情報セキュリティ
機械学習

Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12
情報セキュリティ
脅威モデル

Detection of Iterative Adversarial Attacks via Counter Attack

Authors: Matthias Rottmann, Kira Maag, Mathis Peyron, Natasa Krejic, Hanno Gottschalk | Published: 2020-09-23 | Updated: 2021-03-23
ロバスト性
情報セキュリティ
最適化アルゴリズムの選択と評価

FastSecAgg: Scalable Secure Aggregation for Privacy-Preserving Federated Learning

Authors: Swanand Kadhe, Nived Rajaraman, O. Ozan Koyluoglu, Kannan Ramchandran | Published: 2020-09-23
プライバシー保護技術
情報セキュリティ
通信効率

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20
性能評価
悪意のあるウェブサイト検出
情報セキュリティ

Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11
ウォーターマーキング
データ抽出と分析
情報セキュリティ