Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 Privacy Enhancing TechnologyModel Performance EvaluationReconstruction Durability 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 Few-Shot LearningPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.02 2025.05.28 Literature Database
In-Context Retrieval-Augmented Language Models Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01 RAGData Generation MethodPerformance Evaluation 2023.01.31 2025.05.28 Literature Database
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31 Data CollectionEncrypted Traffic DetectionAnomaly Detection Method 2023.01.31 2025.05.28 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 Automation of CybersecurityData CollectionVulnerability detection 2023.01.31 2025.05.28 Literature Database
Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31 Privacy Enhancing TechnologyParticipant Selection MethodDecision Tree 2023.01.31 2025.05.28 Literature Database
Robust Linear Regression: Gradient-descent, Early-stopping, and Beyond Authors: Meyer Scetbon, Elvis Dohmatob | Published: 2023-01-31 Convergence AnalysisOptimization MethodsLinear Model 2023.01.31 2025.05.28 Literature Database
Behavioural Reports of Multi-Stage Malware Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30 Data CollectionModel Performance EvaluationDynamic Analysis 2023.01.30 2025.05.28 Literature Database
Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30 Backdoor AttackBayesian Adversarial LearningPoisoning 2023.01.30 2025.05.28 Literature Database
Deep Learning model integrity checking mechanism using watermarking technique Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21 DNN IP Protection MethodWatermarkingModel Architecture 2023.01.29 2025.05.28 Literature Database