Decomposing and Editing Predictions by Modeling Model Computation Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17 WatermarkingModel InterpretabilityModel editing techniques 2024.04.17 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database
LLMs for Cyber Security: New Opportunities Authors: Dinil Mon Divakaran, Sai Teja Peddinti | Published: 2024-04-17 LLM SecurityCybersecurity 2024.04.17 2025.05.27 Literature Database
LMEraser: Large Model Unlearning through Adaptive Prompt Tuning Authors: Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia | Published: 2024-04-17 Clustering methodsPrivacy Protection MethodModel Performance Evaluation 2024.04.17 2025.05.27 Literature Database
The Performance of Sequential Deep Learning Models in Detecting Phishing Websites Using Contextual Features of URLs Authors: Saroj Gopali, Akbar S. Namin, Faranak Abri, Keith S. Jones | Published: 2024-04-15 URL analysis techniquesPhishing DetectionDeep Learning Method 2024.04.15 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
Federated Learning on Riemannian Manifolds with Differential Privacy Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15 WatermarkingPrivacy Protection MethodConvergence Analysis 2024.04.15 2025.05.27 Literature Database
Distributed Federated Learning-Based Deep Learning Model for Privacy MRI Brain Tumor Detection Authors: Lisang Zhou, Meng Wang, Ning Zhou | Published: 2024-04-15 Data PreprocessingPrivacy ProtectionThreats of Medical AI 2024.04.15 2025.05.27 Literature Database
Black-box Adversarial Transferability: An Empirical Study in Cybersecurity Perspective Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2024-04-15 DDoS Attack DetectionAttack MethodAdversarial Example 2024.04.15 2025.05.27 Literature Database
Privacy at a Price: Exploring its Dual Impact on AI Fairness Authors: Mengmeng Yang, Ming Ding, Youyang Qu, Wei Ni, David Smith, Thierry Rakotoarivelo | Published: 2024-04-15 Privacy ProtectionPrivacy Protection MethodFairness evaluation 2024.04.15 2025.05.27 Literature Database