An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai | Published: 2024-02-26 | Updated: 2024-05-10

Improving behavior based authentication against adversarial attack using XAI

Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10

LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper

Authors: Daoyuan Wu, Shuai Wang, Yang Liu, Ning Liu | Published: 2024-02-24 | Updated: 2024-03-04

On Trojan Signatures in Large Language Models of Code

Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07

Verifiable Boosted Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22

BIONIB: Blockchain-based IoT using Novelty Index in Bridge Health Monitoring

Authors: Divija Swetha Gadiraju, Ryan McMaster, Saeed Eftekhar Azam, Deepak Khazanchi | Published: 2024-02-22

Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs

Authors: Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann | Published: 2024-02-22

Closed-Form Bounds for DP-SGD against Record-level Inference

Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin | Published: 2024-02-22

Coercing LLMs to do and reveal (almost) anything

Authors: Jonas Geiping, Alex Stein, Manli Shu, Khalid Saifullah, Yuxin Wen, Tom Goldstein | Published: 2024-02-21

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Authors: Mohammad Amaz Uddin, Iqbal H. Sarker | Published: 2024-02-21