Multiclass Classification Procedure for Detecting Attacks on MQTT-IoT Protocol Authors: Hector Alaiz-Moreton, Jose Aveleira-Mata, Jorge Ondicol-Garcia, Angel Luis Muñoz-Castañeda, Isaías García, Carmen Benavides | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Homograph Attacks on Maghreb Sentiment Analyzers Authors: Fatima Zahra Qachfar, Rakesh M. Verma | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Detecting Scams Using Large Language Models Authors: Liming Jiang | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Reconstruct Your Previous Conversations! Comprehensively Investigating Privacy Leakage Risks in Conversations with GPT Models Authors: Junjie Chu, Zeyang Sha, Michael Backes, Yang Zhang | Published: 2024-02-05 | Updated: 2024-10-07 2024.02.05 2025.05.12 Literature Database
Unraveling the Key of Machine Learning Solutions for Android Malware Detection Authors: Jiahao Liu, Jun Zeng, Fabio Pierazzi, Lorenzo Cavallaro, Zhenkai Liang | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Dynamic Byzantine-Robust Learning: Adapting to Switching Byzantine Workers Authors: Ron Dorfman, Naseem Yehya, Kfir Y. Levy | Published: 2024-02-05 | Updated: 2024-06-16 2024.02.05 2025.05.12 Literature Database
Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs) Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Evading Data Contamination Detection for Language Models is (too) Easy Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12 2024.02.05 2025.05.12 Literature Database
Adversarial Text Purification: A Large Language Model Approach for Defense Authors: Raha Moraffah, Shubh Khandelwal, Amrita Bhattacharjee, Huan Liu | Published: 2024-02-05 2024.02.05 2025.05.12 Literature Database
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 2024.02.05 2025.05.12 Literature Database