Constructing Semantics-Aware Adversarial Examples with a Probabilistic Perspective Authors: Andi Zhang, Mingtian Zhang, Damon Wischik | Published: 2023-06-01 | Updated: 2024-11-24 2023.06.01 2025.05.28 Literature Database
Adversarial-Aware Deep Learning System based on a Secondary Classical Machine Learning Verification Approach Authors: Mohammed Alkhowaiter, Hisham Kholidy, Mnassar Alyami, Abdulmajeed Alghamdi, Cliff Zou | Published: 2023-06-01 2023.06.01 2025.05.28 Literature Database
Case Study-Based Approach of Quantum Machine Learning in Cybersecurity: Quantum Support Vector Machine for Malware Classification and Protection Authors: Mst Shapna Akter, Hossain Shahriar, Sheikh Iqbal Ahamed, Kishor Datta Gupta, Muhammad Rahman, Atef Mohamed, Mohammad Rahman, Akond Rahman, Fan Wu | Published: 2023-06-01 2023.06.01 2025.05.28 Literature Database
Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 2023.06.01 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 2023.05.31 2025.05.28 Literature Database
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31 2023.05.31 2025.05.28 Literature Database
Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data Authors: Vivek Nair, Christian Rack, Wenbo Guo, Rui Wang, Shuixian Li, Brandon Huang, Atticus Cull, James F. O'Brien, Marc Latoschik, Louis Rosenberg, Dawn Song | Published: 2023-05-30 | Updated: 2023-06-10 2023.05.30 2025.05.28 Literature Database
Robust Lipschitz Bandits to Adversarial Corruptions Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08 2023.05.29 2025.05.28 Literature Database
Direct Preference Optimization: Your Language Model is Secretly a Reward Model Authors: Rafael Rafailov, Archit Sharma, Eric Mitchell, Stefano Ermon, Christopher D. Manning, Chelsea Finn | Published: 2023-05-29 | Updated: 2024-07-29 2023.05.29 2025.05.28 Literature Database
Membership Inference Attacks against Language Models via Neighbourhood Comparison Authors: Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick | Published: 2023-05-29 | Updated: 2023-08-07 2023.05.29 2025.05.28 Literature Database