An open-source toolkit for debugging AI models of all data typesTechnical noteKevin Eykholt and Taesung Lee08 Sep 2023Adversarial Robustness and PrivacyAI TestingData and AI Security
Simplifying cloud security policies with AITechnical noteJulian Stephen and Shriti Priya13 Jul 2023Cloud SecurityData and AI SecuritySecurity
Protect yourself from bad neighbors in the cloudTechnical noteMichael V. Le, Salman Ahmed, Dan Williams, and Hani Jamjoom07 Jul 2023Data and AI SecuritySecurity
AI diffusion models can be tricked into generating manipulated imagesNewsKim Martineau05 Jun 2023AIAI TestingData and AI SecurityFoundation ModelsGenerative AISecurity
Mezzo TLS 1.3 Protocol, Suitable for Transmitting Already-Encrypted DataNir DruckerShai Gueron2024CSCML 2024
Polynomial Adaptation of Large-Scale CNNs for Homomorphic Encryption-Based Secure InferenceMoran BaruchNir Druckeret al.2024CSCML 2024
A Secure Multiparty Computation Platform for Squeaky-Clean Data RoomsPankaj DayamaVinayaka Panditet al.2024CCS 2024
Exploring Vulnerabilities in LLMs: A Red Teaming Approach to Evaluate Social BiasYuya Jeremy OngJay Pankaj Galaet al.2024IEEE CISOSE 2024
IBM Solution: IBM Cloud Pak for DataOur research is regularly incorporated into new security features for IBM Cloud Pak for Data. Learn more