The Power of MEME: Adversarial Malware Creation with Model-Based Reinforcement Learning Authors: Maria Rigaki, Sebastian Garcia | Published: 2023-08-31 2023.08.31 2025.05.28 Literature Database
Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30 2023.08.30 2025.05.28 Literature Database
Vulnerability of Machine Learning Approaches Applied in IoT-based Smart Grid: A Review Authors: Zhenyong Zhang, Mengxiang Liu, Mingyang Sun, Ruilong Deng, Peng Cheng, Dusit Niyato, Mo-Yuen Chow, Jiming Chen | Published: 2023-08-30 | Updated: 2023-12-25 2023.08.30 2025.05.28 Literature Database
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26 2023.08.30 2025.05.28 Literature Database
Predict And Prevent DDOS Attacks Using Machine Learning and Statistical Algorithms Authors: Azadeh Golduzian | Published: 2023-08-30 2023.08.30 2025.05.28 Literature Database
Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29 2023.08.29 2025.05.28 Literature Database
On the Steganographic Capacity of Selected Learning Models Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29 2023.08.29 2025.05.28 Literature Database
Gender bias and stereotypes in Large Language Models Authors: Hadas Kotek, Rikker Dockum, David Q. Sun | Published: 2023-08-28 2023.08.28 2025.05.28 Literature Database
Generating tabular datasets under differential privacy Authors: Gianluca Truda | Published: 2023-08-28 2023.08.28 2025.05.28 Literature Database
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28 2023.08.28 2025.05.28 Literature Database