Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments Authors: Vishal Karanam | Published: 2023-06-14 Security AnalysisModel Performance EvaluationMachine Learning Technology 2023.06.14 2025.05.28 Literature Database
Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14 Data Protection MethodPrivacy TechniqueInformation Extraction 2023.06.14 2025.05.28 Literature Database
ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13 AlgorithmResource Scarcity IssuesCryptography 2023.06.13 2025.05.28 Literature Database
Theoretical Foundations of Adversarially Robust Learning Authors: Omar Montasser | Published: 2023-06-13 PoisoningRobustness EvaluationAdversarial Example 2023.06.13 2025.05.28 Literature Database
Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14 APT Defense TechniquesAttack MethodMalware Detection with Limited Samples 2023.06.13 2025.05.28 Literature Database
Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13 Data Privacy AssessmentData Protection MethodPrivacy Technique 2023.06.13 2025.05.28 Literature Database
SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13 PoisoningMalicious ClientFederated Learning 2023.06.13 2025.05.28 Literature Database
Intrusion Detection: A Deep Learning Approach Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13 LSTM Model Performance EvaluationClassification Pattern AnalysisAutomated Intrusion Detection System 2023.06.13 2025.05.28 Literature Database
“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12 Data Privacy AssessmentHyperparameter TuningPrivacy Technique 2023.06.12 2025.05.28 Literature Database
Gaussian Membership Inference Privacy Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26 Privacy TechniqueHypothesis TestingStatistical Testing 2023.06.12 2025.05.28 Literature Database