Mass-producing failures of multimodal systems with language models

S Tong, E Jones, J Steinhardt - Advances in Neural …, 2024 - proceedings.neurips.cc
Deployed multimodal models can fail in ways that evaluators did not anticipate. In order to
find these failures before deployment, we introduce MultiMon, a system that automatically …

Towards inspecting and eliminating trojan backdoors in deep neural networks

W Guo, L Wang, Y Xu, X Xing, M Du… - 2020 IEEE International …, 2020 - ieeexplore.ieee.org
A trojan backdoor is a hidden pattern typically implanted in a deep neural network (DNN). It
could be activated and thus forces that infected model to behave abnormally when an input …

Malware detection on windows audit logs using LSTMs

M Ring, D Schlör, S Wunderlich, D Landes… - Computers & Security, 2021 - Elsevier
Malware is a constant threat and is continuously evolving. Security systems try to keep up
with the constant change. One challenge that arises is the large amount of logs generated …

Adversarial adaptive neighborhood with feature importance-aware convex interpolation

Q Li, Y Qi, Q Hu, S Qi, Y Lin… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Adversarial Examples threaten to fool deep learning models to output erroneous predictions
with high confidence. Optimization-based methods for constructing such samples have been …

Effectiveness of security through obscurity methods to avoid web application vulnerability scanners

A Kurniawan, K Ramli - Jurnal Teknik Informatika (Jutif), 2023 - jutif.if.unsoed.ac.id
The concept of security through obscurity is not recommended by the National Institute of
Standards and Technology (NIST) as a form of system security. Basically this concept hides …

The Financial Risk of a Deficiency of Cybersecurity in Industrial Process Controlled Facilities; A Qualitative Multiple Case Study

OL Theiring - 2023 - search.proquest.com
Industrial control systems are the automated and robotic controls that manufacturing facilities
have been integrating into manufacturing equipment since the late 18th century. The …

Understanding & Mitigating the Challenges of Securing Jupyter Notebooks Online

A Ramsingh, P Verma - … on Cyber Security and Resilience (CSR …, 2024 - ieeexplore.ieee.org
Jupyter Notebook applications have become increasingly popular online. However, the
threats against this application are also on the rise. Each year, the attacks and exploitation …

MAlign: Explainable static raw-byte based malware family classification using sequence alignment

S Saha, S Afroz, AH Rahman - Computers & Security, 2024 - Elsevier
For a long time, malware classification and analysis have been an arms-race between
antivirus systems and malware authors. Though static analysis is vulnerable to evasion …

[引用][C] 机器学习模型安全与隐私研究综述

纪守领, 杜天宇, 李进锋, 沈超, 李博 - 软件学报, 2020

On Counter-Adversarial Resilience in Permeable Networked Systems

HW Behrens - 2023 - search.proquest.com
In recent years, a flood of devices has permeated our personal and professional lives, with
increasingly interconnected networks playing an ever-growing role in day-to-day activities …