PWSHAP: A Path-Wise Explanation Model for Targeted Variables Authors: Lucile Ter-Minassian, Oscar Clivio, Karla Diaz-Ordaz, Robin J. Evans, Chris Holmes | Published: 2023-06-26 2023.06.26 2025.05.28 Literature Database
ChatIDS: Explainable Cybersecurity Using Generative AI Authors: Victor Jüttner, Martin Grimmer, Erik Buchmann | Published: 2023-06-26 2023.06.26 2025.05.28 Literature Database
Revolutionizing Cyber Threat Detection with Large Language Models: A privacy-preserving BERT-based Lightweight Model for IoT/IIoT Devices Authors: Mohamed Amine Ferrag, Mthandazo Ndhlovu, Norbert Tihanyi, Lucas C. Cordeiro, Merouane Debbah, Thierry Lestable, Narinderjit Singh Thandi | Published: 2023-06-25 | Updated: 2024-02-08 2023.06.25 2025.05.28 Literature Database
Steganographic Capacity of Deep Learning Models Authors: Lei Zhang, Dong Li, Olha Jurečková, Mark Stamp | Published: 2023-06-25 2023.06.25 2025.05.28 Literature Database
Locally Differentially Private Distributed Online Learning with Guaranteed Optimality Authors: Ziqin Chen, Yongqiang Wang | Published: 2023-06-25 | Updated: 2024-08-23 2023.06.25 2025.05.28 Literature Database
Federated Learning Approach for Distributed Ransomware Analysis Authors: Aldin Vehabovic, Hadi Zanddizari, Farook Shaikh, Nasir Ghani, Morteza Safaei Pour, Elias Bou-Harb, Jorge Crichigno | Published: 2023-06-25 2023.06.25 2025.05.28 Literature Database
On the Uses of Large Language Models to Interpret Ambiguous Cyberattack Descriptions Authors: Reza Fayyazi, Shanchieh Jay Yang | Published: 2023-06-24 | Updated: 2023-08-22 2023.06.24 2025.05.28 Literature Database
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10 2023.06.24 2025.05.28 Literature Database
Boosting Model Inversion Attacks with Adversarial Examples Authors: Shuai Zhou, Tianqing Zhu, Dayong Ye, Xin Yu, Wanlei Zhou | Published: 2023-06-24 2023.06.24 2025.05.28 Literature Database
Creating Valid Adversarial Examples of Malware Authors: Matouš Kozák, Martin Jureček, Mark Stamp, Fabio Di Troia | Published: 2023-06-23 2023.06.23 2025.05.28 Literature Database