NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing Authors: Qingqing Ren, Wen Wang, Shuyong Zhu, Zhiyuan Wu, Yujun Zhang | Published: 2025-01-02 Secure Communication ChannelPrivacy ProtectionCommunication Efficiency 2025.01.02 2025.05.12 Literature Database
MalCL: Leveraging GAN-Based Generative Replay to Combat Catastrophic Forgetting in Malware Classification Authors: Jimin Park, AHyun Ji, Minji Park, Mohammad Saidur Rahman, Se Eun Oh | Published: 2025-01-02 Online LearningMalware Classification 2025.01.02 2025.05.12 Literature Database
HoneypotNet: Backdoor Attacks Against Model Extraction Authors: Yixu Wang, Tianle Gu, Yan Teng, Yingchun Wang, Xingjun Ma | Published: 2025-01-02 Backdoor AttackModel Extraction Attack 2025.01.02 2025.05.12 Literature Database
A Sysmon Incremental Learning System for Ransomware Analysis and Detection Authors: Jamil Ispahany, MD Rafiqul Islam, M. Arif Khan, MD Zahidul Islam | Published: 2025-01-02 Online LearningDynamic Analysis 2025.01.02 2025.05.12 Literature Database
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10 Attack EvaluationAttack MethodAdversarial Example 2025.01.02 2025.05.12 Literature Database
SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01 CybersecurityPrompt InjectionPrompt Engineering 2025.01.01 2025.05.12 Literature Database
Shifting-Merging: Secure, High-Capacity and Efficient Steganography via Large Language Models Authors: Minhao Bai, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang, Yue Gao | Published: 2025-01-01 LLM Performance EvaluationData Obfuscation 2025.01.01 2025.05.12 Literature Database
Beyond Static Datasets: A Behavior-Driven Entity-Specific Simulation to Overcome Data Scarcity and Train Effective Crypto Anti-Money Laundering Models Authors: Dinesh Srivasthav P, Manoj Apte | Published: 2025-01-01 Transaction FlowTransaction Generation Method 2025.01.01 2025.05.12 Literature Database
Ensuring superior learning outcomes and data security for authorized learner Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01 Security AssuranceImprovement of Learning 2025.01.01 2025.05.12 Literature Database
SPDZCoder: Combining Expert Knowledge with LLMs for Generating Privacy-Computing Code Authors: Xiaoning Dong, Peilin Xin, Jia Li, Wei Xu | Published: 2024-12-31 | Updated: 2025-03-21 AlgorithmProgram Interpretation GraphMulti-Party Computation 2024.12.31 2025.05.12 Literature Database