Machine Learning-Based Security Policy Analysis Authors: Krish Jain, Joann Sum, Pranav Kapoor, Amir Eaman | Published: 2024-12-30 | Updated: 2025-01-06 SELinux Policy Anomaly Detection 2024.12.30 2025.05.12 Literature Database
ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07 Text Perturbation MethodBackdoor DetectionWatermarking Technology 2024.12.30 2025.05.12 Literature Database
Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15 Prompt leakingModel DoSInformation Security 2024.12.30 2025.05.12 Literature Database
Robust Matrix Completion for Discrete Rating-Scale Data Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30 AlgorithmSimulation Result Evaluation 2024.12.30 2025.05.12 Literature Database
SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06 LLM Performance EvaluationCybersecurityPrompt Injection 2024.12.30 2025.05.12 Literature Database
A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis Authors: Narasimha Raghavan Veeraragavan, Svetlana Boudko, Jan Franz Nygård | Published: 2024-12-29 Kaplan-Meier EstimationPrivacy ProtectionCryptography 2024.12.29 2025.05.12 Literature Database
Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness Authors: Olukorede Fakorede, Modeste Atsague, Jin Tian | Published: 2024-12-27 Adversarial ExampleAdversarial Training 2024.12.27 2025.05.12 Literature Database
CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31 LLM SecurityBackdoor AttackVulnerability of Adversarial Examples 2024.12.26 2025.05.12 Literature Database
Detection and classification of DDoS flooding attacks by machine learning method Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02 CybersecurityNetwork Threat Detection 2024.12.25 2025.05.12 Literature Database
Fundamental Limits in the Search for Less Discriminatory Algorithms — and How to Avoid Them Authors: Benjamin Laufer, Manisch Raghavan, Solon Barocas | Published: 2024-12-24 BiasLimitations of Non-Discriminatory Algorithms 2024.12.24 2025.05.12 Literature Database