攻撃検出

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models

Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21
プロンプトインジェクション
攻撃検出
透かし技術

Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21
LLM性能評価
インダイレクトプロンプトインジェクション
攻撃検出

A Generative Framework for Low-Cost Result Validation of Machine Learning-as-a-Service Inference

Authors: Abhinav Kumar, Miguel A. Guirao Aguilera, Reza Tourani, Satyajayant Misra | Published: 2023-03-31 | Updated: 2024-04-25
DNN IP保護手法
攻撃検出
適応型敵対的訓練

Attack detection based on machine learning algorithms for different variants of Spectre attacks and different Meltdown attack implementations

Authors: Zhongkai Tong, Ziyuan Zhu, Yusha Zhang, Yuxin Liu, Dan Meng | Published: 2022-08-30
攻撃検出
特徴重要度分析
脆弱性検出

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25
サイバーセキュリティ
攻撃検出
機械学習

An anomaly detection approach for backdoored neural networks: face recognition as a case study

Authors: Alexander Unnervik, Sébastien Marcel | Published: 2022-08-22
バックドア攻撃
攻撃検出
顔認識システム

Byzantines can also Learn from History: Fall of Centered Clipping in Federated Learning

Authors: Kerem Ozfatura, Emre Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2022-08-21 | Updated: 2024-01-01
ビザンチン耐性
ポイズニング
攻撃検出

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak | Published: 2022-08-20 | Updated: 2022-10-30
トレーニングプロトコル
攻撃検出
機械学習技術

Electronic, Wireless, and Photonic Network-on-Chip Security: Challenges and Countermeasures

Authors: Sudeep Pasricha, John Jose, Sujay Deb | Published: 2022-08-18
DoS対策
悪意のあるノード検出
攻撃検出

Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System

Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17
データ保護手法
ポイズニング
攻撃検出