Reference no: EM133643437
Cryptography
Project
There are three options for the class project, each described below. You can pick either one which may beinterested to you. The project can be a research paper, a case study, a simulation, or an implementation.In either case, you are required to write a report about it. You may team up with other partners, if you choose to, in doing your projects. Naturally, a lot more will be expected from such collaborative projects!
The project deliverables are listed below:
• Project middle report: The middle report should include a title and team members if you choose to work as a group. The middle report should also identify the project scope, the research questions you plan to work on, and preliminary ideas about how you are going to address the research questions.
• Project Final report and other documents: The final project report should be a comprehensive report including everything. The final project report has 15 points in the final grade.
• Final project presentation: everyone needs to prepare 10-15 slides for presenting their final project.
The project will be evaluated based on the following criteria:
• Originality and novelty
• Technical depth and soundness
• Presentation quality
The adoption of AIisrising. AI has changed the ways we explore science and conduct businesses:
• AlphaGo is the first computer program to defeat a professional human Go player, the first to defeat a Go world champion, and is arguably the strongest Go player in history.
• Google's DeepMind releases structure of every known protein.
• ChatGPT passes exams from law and business schools.
• Reinventing search with a new AI-powered Microsoft Bing and Edge, your copilot for the web.
However, many threats and attacks have also been reported targetingmachine learning algorithms. For example,
• One pixel attack for fooling deep neural networks (J. Su, D. V. Vargas and K. Sakurai, "One Pixel Attack for Fooling Deep Neural Networks," in IEEE Transactions on Evolutionary Computation, vol. 23, no. 5, pp. 828-841, Oct. 2019, doi: 10.1109/TEVC.2019.2890858.)
As we expect AI continues to change businesses, consumers, and the economy, we would also like to investigate AI related cybersecurity issues.
Large Language Model (LLM)Security
In this project, you will conduct research on security and privacy issues related to LLM. Examples of LLMs include GPT, Llama, and BERT. If you choose this option, you can explore any LLM-related security and privacy issues. The topics include, but are not limited to:
• LLM for offensive security
• LLM for defensive security
• LLM for risk management
• LLM for compliance and auditing
• Threats and attacks in LLM
• Threat modeling in LLM
• An in-depth study of an attack on LLM
• A case study of a cyber-attack on LLM
• Security remediation, e.g., defensive mechanism, in LLM
• Risk assessment in LLM
• Survey of cybersecurity in LLM
Project deliverables:
• Project middle report
• Project final report
• Project presentation slides
• Other related project documents
Project Middle Report Format
• 12-point standard font
• Single column
• Double spacing
• 3-5 pages (citation pages do not count)
Project Final Report Format
• 12-point standard font
• Single column
• Double spacing
• An extension of the middle report
• 10 pagesminimum (title and citation pages do not count): project final report is a complete report of your class project. Project final report can be extended from your middle report.
Note: you are welcome to use IEEE Manuscript Template for your final report. This is a good opportunity to practice academic writing and it may lead to publications too.