Continuous Learning for Android Malware Detection Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14 2023.02.08 2025.05.28 Literature Database
CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23 2023.02.08 2025.05.28 Literature Database
Temporal Robustness against Data Poisoning Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06 2023.02.07 2025.05.28 Literature Database
SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21 2023.02.03 2025.05.28 Literature Database
Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14 2023.02.03 2025.05.28 Literature Database
Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 2023.02.02 2025.05.28 Literature Database
In-Context Retrieval-Augmented Language Models Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01 2023.01.31 2025.05.28 Literature Database
Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31 2023.01.31 2025.05.28 Literature Database
Machine Learning and Port Scans: A Systematic Review Authors: Jason M. Pittman | Published: 2023-01-31 2023.01.31 2025.05.28 Literature Database