A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11 WatermarkingSecurity of Signal TransmissionPhysical layer security 2024.04.11 2025.05.27 Literature Database
Adversarial Robustness of Distilled and Pruned Deep Learning-based Wireless Classifiers Authors: Nayan Moni Baishya, B. R. Manoj | Published: 2024-04-11 Edge ComputingAdversarial ExampleAdversarial Training 2024.04.11 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database
Sandwich attack: Multi-language Mixture Adaptive Attack on LLMs Authors: Bibek Upadhayay, Vahid Behzadan | Published: 2024-04-09 LLM SecurityPrompt InjectionAttack Method 2024.04.09 2025.05.27 Literature Database
Rethinking How to Evaluate Language Model Jailbreak Authors: Hongyu Cai, Arjun Arunasalam, Leo Y. Lin, Antonio Bianchi, Z. Berkay Celik | Published: 2024-04-09 | Updated: 2024-05-07 Prompt InjectionClassification of Malicious ActorsEvaluation Method 2024.04.09 2025.05.27 Literature Database
Aggressive or Imperceptible, or Both: Network Pruning Assisted Hybrid Byzantines in Federated Learning Authors: Emre Ozfatura, Kerem Ozfatura, Alptekin Kupcu, Deniz Gunduz | Published: 2024-04-09 PoisoningAttack MethodDefense Method 2024.04.09 2025.05.27 Literature Database
FuSeBMC AI: Acceleration of Hybrid Approach through Machine Learning Authors: Kaled M. Alshmrany, Mohannad Aldughaim, Chenfeng Wei, Tom Sweet, Richard Allmendinger, Lucas C. Cordeiro | Published: 2024-04-09 Test PrioritizationProgram AnalysisResource optimization 2024.04.09 2025.05.27 Literature Database
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08 WatermarkingMalware ClassificationEvaluation Method 2024.04.08 2025.05.27 Literature Database
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database