Artificial Intelligence for Web 3.0: A Comprehensive Survey Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17 Data Protection MethodPrivacy TechniqueDeep Learning Method 2023.08.17 2025.05.28 Literature Database
An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection Authors: Arun Kumar Silivery, Kovvur Ram Mohan Rao, L K Suresh Kumar | Published: 2023-08-17 DDoS AttackIntrusion Detection SystemDeep Learning Method 2023.08.17 2025.05.28 Literature Database
Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17 WatermarkingCryptographyMachine Learning Method 2023.08.17 2025.05.28 Literature Database
Test-Time Poisoning Attacks Against Test-Time Adaptation Models Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16 PoisoningModel Performance EvaluationAttack Evaluation 2023.08.16 2025.05.28 Literature Database
Time Travel in LLMs: Tracing Data Contamination in Large Language Models Authors: Shahriar Golchin, Mihai Surdeanu | Published: 2023-08-16 | Updated: 2024-02-21 Data Contamination DetectionPrompt InjectionNatural Language Processing 2023.08.16 2025.05.28 Literature Database
Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16 Security AssuranceAttack EvaluationWatermark Robustness 2023.08.16 2025.05.28 Literature Database
Robustness Over Time: Understanding Adversarial Examples’ Effectiveness on Longitudinal Versions of Large Language Models Authors: Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-08-15 | Updated: 2024-05-06 Prompt InjectionModel Performance EvaluationRobustness Evaluation 2023.08.15 2025.05.28 Literature Database
A Review of Adversarial Attacks in Computer Vision Authors: Yutong Zhang, Yao Li, Yin Li, Zhichang Guo | Published: 2023-08-15 PoisoningAdversarial Attack MethodsDefense Method 2023.08.15 2025.05.28 Literature Database
DIVAS: An LLM-based End-to-End Framework for SoC Security Analysis and Policy-based Protection Authors: Sudipta Paria, Aritra Dasgupta, Swarup Bhunia | Published: 2023-08-14 LLM SecuritySecurity AssuranceVulnerability Mitigation Technique 2023.08.14 2025.05.28 Literature Database
FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on Trusted Federated Deep Learning for Mobile Edge Computing Authors: Pan Wang, Zeyi Li, Mengyi Fu, Zixuan Wang, Ze Zhang, MinYao Liu | Published: 2023-08-14 Model InterpretabilityModel Performance EvaluationFederated Learning 2023.08.14 2025.05.28 Literature Database