Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 Membership InferenceWatermark RobustnessWatermark Evaluation 2024.04.21 2025.05.27 Literature Database
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud Authors: Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang | Published: 2024-04-20 WatermarkingQuantum FrameworkQuantum Cryptography Technology 2024.04.20 2025.05.27 Literature Database
Evaluating the Effectiveness of LLMs in Introductory Computer Science Education: A Semester-Long Field Study Authors: Wenhan Lyu, Yimeng Wang, Tingting, Chung, Yifan Sun, Yixuan Zhang | Published: 2024-04-20 | Updated: 2024-05-03 Data Extraction and AnalysisHuman-Centered ComputingEducation and Follow-up 2024.04.20 2025.05.27 Literature Database
Intrusion Detection at Scale with the Assistance of a Command-line Language Model Authors: Jiongliang Lin, Yiwen Guo, Hao Chen | Published: 2024-04-20 Command AnalysisAnomaly Detection MethodAutomated Intrusion Detection System 2024.04.20 2025.05.27 Literature Database
CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models Authors: Manish Bhatt, Sahana Chennabasappa, Yue Li, Cyrus Nikolaidis, Daniel Song, Shengye Wan, Faizan Ahmad, Cornelius Aschermann, Yaohui Chen, Dhaval Kapil, David Molnar, Spencer Whitman, Joshua Saxe | Published: 2024-04-19 LLM SecurityCybersecurityPrompt Injection 2024.04.19 2025.05.27 Literature Database
Physical Backdoor Attack can Jeopardize Driving with Vision-Large-Language Models Authors: Zhenyang Ni, Rui Ye, Yuxi Wei, Zhen Xiang, Yanfeng Wang, Siheng Chen | Published: 2024-04-19 | Updated: 2024-04-22 Backdoor AttackVulnerabilities in Autonomous Driving Technology 2024.04.19 2025.05.27 Literature Database
Ransomware Detection and Classification Using Random Forest: A Case Study with the UGRansome2024 Dataset Authors: Peace Azugo, Hein Venter, Mike Wa Nkongolo | Published: 2024-04-19 CybersecurityDataset GenerationRansomware Assessment 2024.04.19 2025.05.27 Literature Database
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19 DDoS Attack DetectionIoT Device IdentificationWatermarking 2024.04.19 2025.05.27 Literature Database
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06 AlgorithmWatermarkingPrivacy Protection 2024.04.18 2025.05.27 Literature Database
AquaSonic: Acoustic Manipulation of Underwater Data Center Operations and Resource Management Authors: Jennifer Sheldon, Weidong Zhu, Adnan Abdullah, Sri Hrushikesh Varma Bhupathiraju, Takeshi Sugawara, Kevin R. B. Butler, Md Jahidul Islam, Sara Rampazzi | Published: 2024-04-18 | Updated: 2024-05-08 Data Protection MethodResource optimizationSpeech Synthesis Technology 2024.04.18 2025.05.27 Literature Database