FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on Trusted Federated Deep Learning for Mobile Edge Computing Authors: Pan Wang, Zeyi Li, Mengyi Fu, Zixuan Wang, Ze Zhang, MinYao Liu | Published: 2023-08-14 2023.08.14 2025.05.28 Literature Database
S3C2 Summit 2023-06: Government Secure Supply Chain Summit Authors: William Enck, Yasemin Acar, Michel Cukier, Alexandros Kapravelos, Christian Kästner, Laurie Williams | Published: 2023-08-13 2023.08.13 2025.05.28 Literature Database
SoK: Realistic Adversarial Attacks and Defenses for Intelligent Network Intrusion Detection Authors: João Vitorino, Isabel Praça, Eva Maia | Published: 2023-08-13 2023.08.13 2025.05.28 Literature Database
PentestGPT: An LLM-empowered Automatic Penetration Testing Tool Authors: Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-13 | Updated: 2024-06-02 2023.08.13 2025.05.28 Literature Database
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique | Published: 2023-08-10 | Updated: 2023-10-12 2023.08.10 2025.05.28 Literature Database
You Only Prompt Once: On the Capabilities of Prompt Learning on Large Language Models to Tackle Toxic Content Authors: Xinlei He, Savvas Zannettou, Yun Shen, Yang Zhang | Published: 2023-08-10 2023.08.10 2025.05.28 Literature Database
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures Authors: Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis | Published: 2023-08-09 2023.08.09 2025.05.28 Literature Database
ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21 2023.08.09 2025.05.28 Literature Database
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 2023.08.09 2025.05.28 Literature Database
A Feature Set of Small Size for the PDF Malware Detection Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10 2023.08.09 2025.05.28 Literature Database