Accuracy Improvement in Differentially Private Logistic Regression: A Pre-training Approach Authors: Mohammad Hoseinpour, Milad Hoseinpour, Ali Aghagolzadeh | Published: 2023-07-25 | Updated: 2024-02-12 Data Privacy AssessmentImprovement of Learning 2023.07.25 2025.05.28 Literature Database
Malware Resistant Data Protection in Hyper-connected Networks: A survey Authors: Jannatul Ferdous, Rafiqul Islam, Maumita Bhattacharya, Md Zahidul Islam | Published: 2023-07-24 CybersecurityMalware Propagation MeansClassification of Malicious Actors 2023.07.24 2025.05.28 Literature Database
Why Don’t You Clean Your Glasses? Perception Attacks with Dynamic Optical Perturbations Authors: Yi Han, Matthew Chan, Eric Wengrowski, Zhuohuan Li, Nils Ole Tippenhauer, Mani Srivastava, Saman Zonouz, Luis Garcia | Published: 2023-07-24 | Updated: 2023-07-27 Attack MethodAdversarial ExamplePhysical attack 2023.07.24 2025.05.28 Literature Database
A Differentially Private Weighted Empirical Risk Minimization Procedure and its Application to Outcome Weighted Learning Authors: Spencer Giddens, Yiwang Zhou, Kevin R. Krull, Tara M. Brinkman, Peter X. K. Song, Fang Liu | Published: 2023-07-24 | Updated: 2024-09-27 Data Privacy AssessmentWatermarking Settings for Medical DataOptimization Problem 2023.07.24 2025.05.28 Literature Database
Getting pwn’d by AI: Penetration Testing with Large Language Models Authors: Andreas Happe, Jürgen Cito | Published: 2023-07-24 | Updated: 2023-08-17 LLM SecurityPrompt InjectionPenetration Testing Methods 2023.07.24 2025.05.28 Literature Database
Maximal Information Leakage from Quantum Encoding of Classical Data Authors: Farhad Farokhi | Published: 2023-07-24 | Updated: 2024-01-02 Data Privacy AssessmentInformation Gathering MethodsQuantum Cryptography Technology 2023.07.24 2025.05.28 Literature Database
Security and Privacy Issues of Federated Learning Authors: Jahid Hasan | Published: 2023-07-22 PoisoningMembership InferenceFederated Learning 2023.07.22 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
Digital Healthcare in The Metaverse: Insights into Privacy and Security Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-10 Data Protection MethodBackdoor AttackPrivacy Risk Management 2023.07.22 2025.05.28 Literature Database
The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21 Data GenerationPrompt InjectionAnalysis of Detection Methods 2023.07.21 2025.05.28 Literature Database