Discretization-based ensemble model for robust learning in IoT

Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18

Privacy-preserving patient clustering for personalized federated learning

Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17

G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts

Authors: Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar | Published: 2023-07-17

Metadata-based Malware Detection on Android using Machine Learning

Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17

A Machine Learning based Empirical Evaluation of Cyber Threat Actors High Level Attack Patterns over Low level Attack Patterns in Attributing Attacks

Authors: Umara Noor, Sawera Shahid, Rimsha Kanwal, Zahid Rashid | Published: 2023-07-17

MasterKey: Automated Jailbreak Across Multiple Large Language Model Chatbots

Authors: Gelei Deng, Yi Liu, Yuekang Li, Kailong Wang, Ying Zhang, Zefeng Li, Haoyu Wang, Tianwei Zhang, Yang Liu | Published: 2023-07-16 | Updated: 2023-10-25

Real-time Traffic Classification for 5G NSA Encrypted Data Flows With Physical Channel Records

Authors: Xiao Fei, Philippe Martins, Jialiang Lu | Published: 2023-07-15

On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms

Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15

Population Expansion for Training Language Models with Private Federated Learning

Authors: Tatsuki Koga, Congzheng Song, Martin Pelikan, Mona Chitnis | Published: 2023-07-14