FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03 2023.10.03 2025.05.28 Literature Database
Beyond Labeling Oracles: What does it mean to steal ML models? Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13 2023.10.03 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 2023.10.03 2025.05.28 Literature Database
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused? Authors: Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu | Published: 2023-10-02 2023.10.02 2025.05.28 Literature Database
LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 2023.10.02 2025.05.28 Literature Database
Large Language Model-Powered Smart Contract Vulnerability Detection: New Perspectives Authors: Sihao Hu, Tiansheng Huang, Fatih İlhan, Selim Furkan Tekin, Ling Liu | Published: 2023-10-02 | Updated: 2023-10-16 2023.10.02 2025.05.28 Literature Database
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02 2023.10.02 2025.05.28 Literature Database
Prov2vec: Learning Provenance Graph Representation for Unsupervised APT Detection Authors: Bibek Bhattarai, H. Howie Huang | Published: 2023-10-02 2023.10.02 2025.05.28 Literature Database
Learning Type Inference for Enhanced Dataflow Analysis Authors: Lukas Seidel, Sedick David Baker Effendi, Xavier Pinho, Konrad Rieck, Brink van der Merwe, Fabian Yamaguchi | Published: 2023-10-01 | Updated: 2023-10-04 2023.10.01 2025.05.28 Literature Database
Performance evaluation of Machine learning algorithms for Intrusion Detection System Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01 2023.10.01 2025.05.28 Literature Database