DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19 DDoS Attack DetectionIoT Device IdentificationWatermarking 2024.04.19 2025.05.27 Literature Database
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06 AlgorithmWatermarkingPrivacy Protection 2024.04.18 2025.05.27 Literature Database
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi | Published: 2024-04-18 | Updated: 2024-05-08 Data Protection MethodResource optimizationSpeech Synthesis Technology 2024.04.18 2025.05.27 Literature Database
Decomposing and Editing Predictions by Modeling Model Computation Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17 WatermarkingModel InterpretabilityModel editing techniques 2024.04.17 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database
LLMs for Cyber Security: New Opportunities Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17 LLM SecurityCybersecurity 2024.04.17 2025.05.27 Literature Database
LMEraser: Large Model Unlearning through Adaptive Prompt Tuning Authors: Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia | Published: 2024-04-17 Clustering methodsPrivacy Protection MethodModel Performance Evaluation 2024.04.17 2025.05.27 Literature Database
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15 URL analysis techniquesPhishing DetectionDeep Learning Method 2024.04.15 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
Federated Learning on Riemannian Manifolds with Differential Privacy Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15 WatermarkingPrivacy Protection MethodConvergence Analysis 2024.04.15 2025.05.27 Literature Database