Vulnerable Source Code Detection using SonarCloud Code Analysis Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05 2023.07.05 2025.05.28 Literature Database
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04 2023.07.04 2025.05.28 Literature Database
ProPILE: Probing Privacy Leakage in Large Language Models Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04 2023.07.04 2025.05.28 Literature Database
Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04 2023.07.04 2025.05.28 Literature Database
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04 2023.07.04 2025.05.28 Literature Database
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 2023.07.04 2025.05.28 Literature Database
Learning to Prompt in the Classroom to Understand AI Limits: A pilot study Authors: Emily Theophilou, Cansu Koyuturk, Mona Yavari, Sathya Bursic, Gregor Donabauer, Alessia Telari, Alessia Testa, Raffaele Boiano, Davinia Hernandez-Leo, Martin Ruskov, Davide Taibi, Alessandro Gabbiadini, Dimitri Ognibene | Published: 2023-07-04 | Updated: 2023-09-01 2023.07.04 2025.05.28 Literature Database
Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03 2023.07.03 2025.05.28 Literature Database
Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03 2023.07.03 2025.05.28 Literature Database
Defending Against Poisoning Attacks in Federated Learning with Blockchain Authors: Nanqing Dong, Zhipeng Wang, Jiahao Sun, Michael Kampffmeyer, William Knottenbelt, Eric Xing | Published: 2023-07-02 | Updated: 2024-03-12 2023.07.02 2025.05.28 Literature Database