News
NDSS 2025 - NDSS 2025 - BARBIE: Robust Backdoor Detection Based On Latent Separability
3+ hour, 13+ min ago (449+ words) Session 12D: ML Backdoors Authors, Creators & Presenters: Hanlei Zhang (Zhejiang University), Yijie Bai (Zhejiang University), Yanjiao Chen (Zhejiang University), Zhongming Ma (Zhejiang University), Wenyuan Xu (Zhejiang University) PAPER BARBIE: Robust Backdoor Detection Based On Latent Separability Backdoor attacks are an essential…...
Why LLMs Make Terrible Databases and Why That Matters for Trusted AI
5+ hour, 12+ min ago (62+ words) Large language models (LLMs) are now embedded across the SDLC. They summarize documentation, generate code, explain vulnerabilities, and assist with architectural decisions. Home " Security Bloggers Network " Why LLMs Make Terrible Databases and Why That Matters for Trusted AI Large language…...
NDSS 2025 - Defending Against Backdoor Attacks On Graph Neural Networks Via Discrepancy Learning
7+ hour, 13+ min ago (542+ words) Session 12D: ML Backdoors Authors, Creators & Presenters: Hao Yu (National University of Defense Technology), Chuan Ma (Chongqing University), Xinhang Wan (National University of Defense Technology), Jun Wang (National University of Defense Technology), Tao Xiang (Chongqing University), Meng Shen (Beijing Institute of…...
NDSS 2025 - Try to Poison My Deep Learning Data? Nowhere To Hide Your Trajectory Spectrum!
1+ day, 3+ hour ago (587+ words) Session 12D: ML Backdoors Authors, Creators & Presenters: Yansong Gao (The University of Western Australia), Huaibing Peng (Nanjing University of Science and Technology), Hua Ma (CSIRO's Data61), Zhi Zhang (The University of Western Australia), Shuo Wang (Shanghai Jiao Tong University), Rayne Holland (CSIRO's…...
NDSS 2025 - CLIBE: Detecting Dynamic Backdoors In Transformer-based NLP Models
1+ day, 7+ hour ago (520+ words) Session 12D: ML Backdoors Authors, Creators & Presenters: Rui Zeng (Zhejiang University), Xi Chen (Zhejiang University), Yuwen Pu (Zhejiang University), Xuhong Zhang (Zhejiang University), Tianyu Du (Zhejiang University), Shouling Ji (Zhejiang University) PAPER CLIBE: Detecting Dynamic Backdoors in Transformer-based NLP Models Backdoors…...
NDSS 2025 - Defending Against Membership Inference Attacks On Iteratively Pruned Deep Neural Network
2+ day, 7+ hour ago (397+ words) Session 12C: Membership Inference Authors, Creators & Presenters: Jing Shang (Beijing Jiaotong University), Jian Wang (Beijing Jiaotong University), Kailun Wang (Beijing Jiaotong University), Jiqiang Liu (Beijing Jiaotong University), Nan Jiang (Beijing University of Technology), Md Armanuzzaman (Northeastern University), Ziming Zhao (Northeastern University)…...
NDSS 2025 - A Method To Facilitate Membership Inference Attacks In Deep Learning Models
3+ day, 7+ hour ago (325+ words) Session 12C: Membership Inference Authors, Creators & Presenters: Zitao Chen (University of British Columbia), Karthik Pattabiraman (University of British Columbia) PAPER A Method to Facilitate Membership Inference Attacks in Deep Learning Models Modern machine learning (ML) ecosystems offer a surging number of ML…...
NDSS 2025 - Black-Box Membership Inference Attacks Against Fine-Tuned Diffusion Models
5+ day, 7+ hour ago (305+ words) Session 12C: Membership Inference Authors, Creators & Presenters: Yan Pang (University of Virginia), Tianhao Wang (University of Virginia) PAPER Black-box Membership Inference Attacks against Fine-tuned Diffusion Models With the rapid advancement of diffusion-based image-generative models, the quality of generated images has become…...
How AI-Enabled Incident Triage Reduces False Positives
2+ week, 2+ hour ago (448+ words) Home " Cybersecurity " Incident Response " How AI-Enabled Incident Triage Reduces False Positives AI-enabled incident triage reduces false positives by using agentic AI automation to analyze alert context, severity, and patterns in real time. This approach filters out low-value alerts and enriches…...
Asset Intelligence as Context Engineering for Cybersecurity Operations
2+ week, 11+ hour ago (907+ words) Home " Cybersecurity " Asset Intelligence as Context Engineering for Cybersecurity Operations Action depends on truth. Truth is hard to come by. Today's AI inflection point has changed our perspective towards the art of the possible " both in what we can build…...