Intrusion Detection Systems for Flying Ad-hoc Networks Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08 2023.06.08 2025.05.28 Literature Database
Prompt Injection attack against LLM-integrated Applications Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02 2023.06.08 2025.05.28 Literature Database
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06 2023.06.08 2025.05.28 Literature Database
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12 2023.06.08 2025.05.28 Literature Database
Machine Learning in Digital Forensics: A Systematic Literature Review Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08 2023.06.08 2025.05.28 Literature Database
Flow-based Network Intrusion Detection Based on BERT Masked Language Model Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-06-08 2023.06.08 2025.05.28 Literature Database
Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13 2023.06.08 2025.05.28 Literature Database
Differentially Private Selection from Secure Distributed Computing Authors: Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh | Published: 2023-06-07 | Updated: 2023-06-08 2023.06.07 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 2023.06.07 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 2023.06.07 2025.05.28 Literature Database