Query-Free Evasion Attacks Against Machine Learning-Based Malware Detectors with Generative Adversarial Networks Authors: Daniel Gibert, Jordi Planes, Quan Le, Giulio Zizzo | Published: 2023-06-16 PoisoningMalware Propagation MeansAdversarial Spectrum Attack Detection 2023.06.16 2025.05.28 Literature Database
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
Inroads into Autonomous Network Defence using Explained Reinforcement Learning Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15 AlgorithmSimulation Result EvaluationDeep Learning Method 2023.06.15 2025.05.28 Literature Database
Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language Models Authors: Myles Foley, Ambrish Rawat, Taesung Lee, Yufang Hou, Gabriele Picco, Giulio Zizzo | Published: 2023-06-15 LLM Performance EvaluationAlgorithmPrompt Injection 2023.06.15 2025.05.28 Literature Database
A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey | Published: 2023-06-15 Cyber AttackAttack Graph GenerationThreat modeling 2023.06.15 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16 AlgorithmMembership InferenceComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fairness and Privacy-Preserving in Federated Learning: A Survey Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14 Privacy TechniquePoisoningFederated Learning 2023.06.14 2025.05.28 Literature Database
Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database