Can you See me? On the Visibility of NOPs against Android Malware Detectors Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28 Code Change AnalysisAttack MethodWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Optimizing watermarks for large language models Authors: Bram Wouters | Published: 2023-12-28 Optimization MethodsWatermark RobustnessWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Attack Tree Analysis for Adversarial Evasion Attacks Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28 PoisoningAdversarial attackWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28 PoisoningMachine UnlearningWatermark Evaluation 2023.12.28 2025.05.27 Literature Database
Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27 Dataset GenerationModel Performance EvaluationLiterature List 2023.12.27 2025.05.27 Literature Database
Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption Authors: Dongfang Zhao | Published: 2023-12-26 AlgorithmWatermarkingCryptography 2023.12.26 2025.05.27 Literature Database
Robust Survival Analysis with Adversarial Regularization Authors: Michael Potter, Stefano Maxenti, Michael Everett | Published: 2023-12-26 | Updated: 2024-09-19 Cox Proportional Hazards ModelSurvival AnalysisTime-Related Features 2023.12.26 2025.05.27 Literature Database
Reinforcement Unlearning Authors: Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue | Published: 2023-12-26 | Updated: 2024-09-09 RobustnessReinforcement LearningComplexity of the Environment 2023.12.26 2025.05.27 Literature Database
SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security Authors: Zefang Liu | Published: 2023-12-26 LLM Performance EvaluationCybersecurityPrompt Injection 2023.12.26 2025.05.27 Literature Database
An Empirical Study of Efficiency and Privacy of Federated Learning Algorithms Authors: Sofia Zahri, Hajar Bennouri, Ahmed M. Abdelmoniem | Published: 2023-12-24 Privacy ProtectionPrivacy Protection MethodFederated Learning 2023.12.24 2025.05.27 Literature Database