interrogate 发表于 2025-3-26 23:52:54
Synthetic Is All You Need: Removing the Auxiliary Data Assumption for Membership Inference Attacks Ae attacks (MIAs), based on shadow modeling, have become the standard to evaluate the privacy of synthetic data, they currently assume the attacker to have access to an auxiliary dataset sampled from a similar distribution as the training dataset. This is often seen as a very strong assumption in praGustatory 发表于 2025-3-27 04:47:46
http://reply.papertrans.cn/24/2339/233883/233883_32.pngKinetic 发表于 2025-3-27 07:56:59
http://reply.papertrans.cn/24/2339/233883/233883_33.pngCHANT 发表于 2025-3-27 12:30:31
http://reply.papertrans.cn/24/2339/233883/233883_34.pngCAMEO 发表于 2025-3-27 17:30:09
http://reply.papertrans.cn/24/2339/233883/233883_35.png拥挤前 发表于 2025-3-27 21:29:19
Differentially Private Traffic Flow Prediction Using Transformers: A Federated Approachisting traffic flow prediction techniques using deep learning, mostly LSTMs, have achieved enormous success based on the large traffic flow datasets collected by governments and different organizations. Nevertheless, a lot of these datasets contain sensitive attributes that may relate to users’ priv小步舞 发表于 2025-3-28 00:57:11
Analyzing Continuous K,-Anonymization for Smart Meter Data evaluated in the context of a dataset to make meaningful statements about their eligibility for a particular use case. In this paper, we therefore analyze the suitability of continuous .-anonymization with CASTLE for data streams generated by smart meters. We compare CASTLE ’s continuous, piecewiseDevastate 发表于 2025-3-28 04:16:31
http://reply.papertrans.cn/24/2339/233883/233883_38.png凶猛 发表于 2025-3-28 07:54:23
METRICS: A Methodology for Evaluating and Testing the Resilience of Industrial Control Systems to Cyng ICS testbeds by enabling the configuration of measurement campaigns for comprehensive resilience evaluations. Therefore, the user specifies individual evaluation scenarios consisting of cyberattacks and countermeasures while facilitating manual and automatic interventions. Moreover, . provides do同时发生 发表于 2025-3-28 13:05:10
Skade – A Challenge Management System for Cyber Threat Huntinglators are presented, e.g. the data they need to provide to enable generation of feedback to trainees. Seven required functions are identified, e.g. the ability to produce assessment questions based on logs from emulators.