Backdoor Secrets Unveiled: Identifying Backdoor Data with Optimized Scaled Prediction Consistency Authors: Soumyadeep Pal, Yuguang Yao, Ren Wang, Bingquan Shen, Sijia Liu | Published: 2024-03-15 WatermarkingBackdoor AttackPoisoning 2024.03.15 2025.05.27 Literature Database
A Survey of Source Code Representations for Machine Learning-Based Cybersecurity Tasks Authors: Beatrice Casey, Joanna C. S. Santos, George Perry | Published: 2024-03-15 | Updated: 2025-04-09 WatermarkingProgram AnalysisMembership Inference 2024.03.15 2025.05.27 Literature Database
SocialGenPod: Privacy-Friendly Generative AI Social Web Applications with Decentralised Personal Data Stores Authors: Vidminas Vizgirda, Rui Zhao, Naman Goel | Published: 2024-03-15 WatermarkingData Management SystemPrivacy Protection 2024.03.15 2025.05.27 Literature Database
Conformal Predictions for Probabilistically Robust Scalable Machine Learning Classification Authors: Alberto Carlevaro, Teodoro Alamo Cantarero, Fabrizio Dabbene, Maurizio Mongelli | Published: 2024-03-15 WatermarkingModel InterpretabilityQuantification of Uncertainty 2024.03.15 2025.05.27 Literature Database
NetBench: A Large-Scale and Comprehensive Network Traffic Benchmark Dataset for Foundation Models Authors: Chen Qian, Xiaochang Li, Qineng Wang, Gang Zhou, Huajie Shao | Published: 2024-03-15 | Updated: 2024-03-19 WatermarkingDataset GenerationNetwork Threat Detection 2024.03.15 2025.05.27 Literature Database
Interactive Trimming against Evasive Online Data Manipulation Attacks: A Game-Theoretic Approach Authors: Yue Fu, Qingqing Ye, Rong Du, Haibo Hu | Published: 2024-03-15 Backdoor AttackPrivacy Protection MethodStrategic Game 2024.03.15 2025.05.27 Literature Database
Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks Authors: Zahir Alsulaimawi | Published: 2024-03-15 Scalability AnalysisSecurity AnalysisFederated Learning 2024.03.15 2025.05.27 Literature Database
Symbiotic Game and Foundation Models for Cyber Deception Operations in Strategic Cyber Warfare Authors: Tao Li, Quanyan Zhu | Published: 2024-03-14 | Updated: 2024-08-19 CybersecurityProactive DefenseStrategic Game 2024.03.14 2025.05.27 Literature Database
Helpful or Harmful? Exploring the Efficacy of Large Language Models for Online Grooming Prevention Authors: Ellie Prosser, Matthew Edwards | Published: 2024-03-14 LLM Performance EvaluationOnline Safety AdvicePrompt Injection 2024.03.14 2025.05.27 Literature Database
AdaShield: Safeguarding Multimodal Large Language Models from Structure-based Attack via Adaptive Shield Prompting Authors: Yu Wang, Xiaogeng Liu, Yu Li, Muhao Chen, Chaowei Xiao | Published: 2024-03-14 Prompt InjectionStructural AttackDefense Method 2024.03.14 2025.05.27 Literature Database