Fake or Compromised? Making Sense of Malicious Clients in Federated Learning Authors: Hamid Mozaffari, Sunav Choudhary, Amir Houmansadr | Published: 2024-03-10 Backdoor AttackPoisoningMalicious Client 2024.03.10 2025.05.27 Literature Database
Cross-ecosystem categorization: A manual-curation protocol for the categorization of Java Maven libraries along Python PyPI Topics Authors: Ranindya Paramitha, Yuan Feng, Fabio Massacci, Carlos E. Budde | Published: 2024-03-10 Dataset GenerationLibrary Classification 2024.03.10 2025.05.27 Literature Database
Fluent: Round-efficient Secure Aggregation for Private Federated Learning Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10 Computational EfficiencyCommunication EfficiencyFederated Learning 2024.03.10 2025.05.27 Literature Database
DP-TabICL: In-Context Learning with Differentially Private Tabular Data Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08 Few-Shot LearningPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
EdgeLeakage: Membership Information Leakage in Distributed Edge Intelligence Systems Authors: Kongyang Chen, Yi Lin, Hui Luo, Bing Mi, Yatie Xiao, Chao Ma, Jorge Sá Silva | Published: 2024-03-08 WatermarkingMembership InferenceDefense Method 2024.03.08 2025.05.27 Literature Database
On Protecting the Data Privacy of Large Language Models (LLMs): A Survey Authors: Biwei Yan, Kun Li, Minghui Xu, Yueyan Dong, Yue Zhang, Zhaochun Ren, Xiuzhen Cheng | Published: 2024-03-08 | Updated: 2024-03-14 Backdoor AttackPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
ZTRAN: Prototyping Zero Trust Security xApps for Open Radio Access Network Deployments Authors: Aly S. Abdalla, Joshua Moore, Nisha Adhikari, Vuk Marojevic | Published: 2024-03-06 Zero TrustNetwork SlicingIntrusion Detection System 2024.03.06 2025.05.27 Literature Database
Fuzzing BusyBox: Leveraging LLM and Crash Reuse for Embedded Bug Unearthing Authors: Asmita, Yaroslav Oliinyk, Michael Scott, Ryan Tsang, Chongzhou Fang, Houman Homayoun | Published: 2024-03-06 LLM SecurityFuzzingInitial Seed Generation 2024.03.06 2025.05.27 Literature Database
Effect of Ambient-Intrinsic Dimension Gap on Adversarial Vulnerability Authors: Rajdeep Haldar, Yue Xing, Qifan Song | Published: 2024-03-06 | Updated: 2024-03-23 Clustering methodsAdversarial ExampleAdversarial Training 2024.03.06 2025.05.27 Literature Database
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06 | Updated: 2025-05-13 Prompt InjectionMalware ClassificationFederated Learning 2024.03.06 2025.05.27 Literature Database