IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02 IoT Device IdentificationData PreprocessingVulnerability detection 2023.08.02 2025.05.28 Literature Database
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01 Watermarking Settings for Medical DataWatermark RobustnessFederated Learning 2023.08.01 2025.05.28 Literature Database
Differentially Private Linear Regression with Linked Data Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08 Secure Logistic RegressionData GenerationPrivacy Protection Method 2023.08.01 2025.05.28 Literature Database
Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03 Data GenerationVulnerability detectionQuantum Cryptography Technology 2023.08.01 2025.05.28 Literature Database
Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01 Adversarial attackOptimization MethodsLinear Model 2023.08.01 2025.05.28 Literature Database
Compressed Private Aggregation for Scalable and Robust Federated Learning over Massive Networks Authors: Natalie Lang, Nir Shlezinger, Rafael G. L. D'Oliveira, Salim El Rouayheb | Published: 2023-08-01 | Updated: 2025-05-08 Scalability AnalysisPrivacy Protection MethodFederated Learning 2023.08.01 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database
A Novel Deep Learning based Model to Defend Network Intrusion Detection System against Adversarial Attacks Authors: Khushnaseeb Roshan, Aasim Zafar, Shiekh Burhan Ul Haque | Published: 2023-07-31 Data PreprocessingAdversarial attackDeep Learning Method 2023.07.31 2025.05.28 Literature Database
Backdooring Instruction-Tuned Large Language Models with Virtual Prompt Injection Authors: Jun Yan, Vikas Yadav, Shiyang Li, Lichang Chen, Zheng Tang, Hai Wang, Vijay Srinivasan, Xiang Ren, Hongxia Jin | Published: 2023-07-31 | Updated: 2024-04-03 LLM SecuritySystem Prompt GenerationPrompt Injection 2023.07.31 2025.05.28 Literature Database
Confidential Computing across Edge-to-Cloud for Machine Learning: A Survey Study Authors: SM Zobaed, Mohsen Amini Salehi | Published: 2023-07-31 TEE ImplementationSoftware SecurityData Management System 2023.07.31 2025.05.28 Literature Database