Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15 Data PreprocessingPrivacy ProtectionThreats of Medical AI 2024.04.15 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database
Privacy at a Price: Exploring its Dual Impact on AI Fairness Authors: Mengmeng Yang, Ming Ding, Youyang Qu, Wei Ni, David Smith, Thierry Rakotoarivelo | Published: 2024-04-15 Privacy ProtectionPrivacy Protection MethodFairness evaluation 2024.04.15 2025.05.27 Literature Database
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14 WatermarkingTraining ProtocolPrivacy Protection Method 2024.04.14 2025.05.27 Literature Database
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13 FPGAResource optimizationComputational Efficiency 2024.04.13 2025.05.27 Literature Database
Multimodal Attack Detection for Action Recognition Models Authors: Furkan Mumcu, Yasin Yilmaz | Published: 2024-04-13 DoS MitigationAdversarial TrainingDefense Method 2024.04.13 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.04.12 2025.05.27 Literature Database
Online Safety Analysis for LLMs: a Benchmark, an Assessment, and a Path Forward Authors: Xuan Xie, Jiayang Song, Zhehua Zhou, Yuheng Huang, Da Song, Lei Ma | Published: 2024-04-12 LLM SecurityLLM Performance EvaluationPrompt Injection 2024.04.12 2025.05.27 Literature Database
Subtoxic Questions: Dive Into Attitude Change of LLM’s Response in Jailbreak Attempts Authors: Tianyu Zhang, Zixuan Zhao, Jiaqi Huang, Jingyu Hua, Sheng Zhong | Published: 2024-04-12 LLM SecurityPrompt InjectionPrompt Engineering 2024.04.12 2025.05.27 Literature Database