Security and privacy on generative data in aigc: A survey

T Wang, Y Zhang, S Qi, R Zhao, X Zhihua… - ACM Computing …, 2023 - dl.acm.org
The advent of artificial intelligence-generated content (AIGC) represents a pivotal moment in
the evolution of information technology. With AIGC, it can be effortless to generate high …

Detection of cross-site scripting (XSS) attacks using machine learning techniques: a review

J Kaur, U Garg, G Bathla - Artificial Intelligence Review, 2023 - Springer
With the rising demand for E-commerce, Social Networking websites, it has become
essential to develop security protocols over the World Wide Web that can provide security …

[PDF][PDF] Cyber security techniques for detecting and preventing cross-site scripting attacks

O Okusi - World Journal of Innovation and Modern Technology, 2024 - iiardjournals.org
As the demand as well as use of web application increases daily so also different cyber
security threats to it increases alarmingly. Cross-Site Scripting (XSS) attack is one in which …

E3m: Zero-shot spatio-temporal video grounding with expectation-maximization multimodal modulation

P Bao, Z Shao, W Yang, BP Ng, AC Kot - European Conference on …, 2025 - Springer
Spatio-temporal video grounding aims to localize the spatio-temporal tube in a video
according to the given language query. To eliminate the annotation costs, we make a first …

Advanced hybrid metaheuristic machine learning models application for reference crop evapotranspiration prediction

RMA Ikram, RR Mostafa, Z Chen, ARMT Islam, O Kisi… - Agronomy, 2022 - mdpi.com
Hybrid metaheuristic algorithm (MA), an advanced tool in the artificial intelligence field,
provides precise reference evapotranspiration (ETo) prediction that is highly important for …

Adversarial attacks and countermeasures on image classification-based deep learning models in autonomous driving systems: A systematic review

B Badjie, J Cecílio, A Casimiro - ACM Computing Surveys, 2024 - dl.acm.org
The rapid development of artificial intelligence (AI) and breakthroughs in Internet of Things
(IoT) technologies have driven the innovation of advanced autonomous driving systems …

Label-only membership inference attacks and defenses in semantic segmentation models

G Zhang, B Liu, T Zhu, M Ding… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Recent research has discovered that deep learning models are vulnerable to membership
inference attacks, which can reveal whether a sample is in the training dataset of the victim …

Privacy preservation for federated learning in health care

S Pati, S Kumar, A Varma, B Edwards, C Lu, L Qu… - Patterns, 2024 - cell.com
Artificial intelligence (AI) shows potential to improve health care by leveraging data to build
models that can inform clinical workflows. However, access to large quantities of diverse …

Privacy intelligence: A survey on image privacy in online social networks

C Liu, T Zhu, J Zhang, W Zhou - ACM Computing Surveys, 2022 - dl.acm.org
Image sharing on online social networks (OSNs) has become an indispensable part of daily
social activities, but it has also increased the risk of privacy invasion. An online image can …

Face image de‐identification by feature space adversarial perturbation

H Xue, B Liu, X Yuan, M Ding… - … and Computation: Practice …, 2023 - Wiley Online Library
Privacy leakage in images attracts increasing concerns these days, as photos uploaded to
large social platforms are usually not processed by proper privacy protection mechanisms …