Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16 ポイズニング攻撃手法防御手法 2024.05.16 2025.04.03 文献データベース
TroLLoc: Logic Locking and Layout Hardening for IC Security Closure against Hardware Trojans Authors: Fangzhou Wang, Qijing Wang, Lilas Alrahis, Bangqi Fu, Shui Jiang, Xiaopeng Zhang, Ozgur Sinanoglu, Tsung-Yi Ho, Evangeline F. Y. Young, Johann Knechtel | Published: 2024-05-09 レイアウトセキュリティ脅威モデリング防御手法 2024.05.09 2025.04.03 文献データベース
Model Inversion Robustness: Can Transfer Learning Help? Authors: Sy-Tuyen Ho, Koh Jun Hao, Keshigeyan Chandrasegaran, Ngoc-Bao Nguyen, Ngai-Man Cheung | Published: 2024-05-09 プライバシー保護手法メンバーシップ推論防御手法 2024.05.09 2025.04.03 文献データベース
Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06 物理攻撃脅威モデリング防御手法 2024.05.06 2025.04.03 文献データベース
An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape Authors: Sifat Muhammad Abdullah, Aravind Cheruvu, Shravya Kanchi, Taejoong Chung, Peng Gao, Murtuza Jadliwala, Bimal Viswanath | Published: 2024-04-24 ポイズニング透かし評価防御手法 2024.04.24 2025.04.03 文献データベース
Multimodal Attack Detection for Action Recognition Models Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13 DoS対策敵対的訓練防御手法 2024.04.13 2025.04.03 文献データベース
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 ポイズニング攻撃手法防御手法 2024.04.09 2025.04.03 文献データベース
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05 ポイズニング連合学習防御手法 2024.04.05 2025.04.03 文献データベース
Adversarial Attacks and Defenses in Fault Detection and Diagnosis: A Comprehensive Benchmark on the Tennessee Eastman Process Authors: Vitaliy Pozdnyakov, Aleksandr Kovalenko, Ilya Makarov, Mikhail Drobyshevskiy, Kirill Lukyanov | Published: 2024-03-20 | Updated: 2024-06-07 攻撃手法敵対的サンプル防御手法 2024.03.20 2025.04.03 文献データベース
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 プロンプトインジェクション構造的攻撃防御手法 2024.03.14 2025.04.03 文献データベース