VulCurator: A Vulnerability-Fixing Commit Detector Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07 2022.09.07 2025.05.28 Literature Database
SAGE: Software-based Attestation for GPU Execution Authors: Andrei Ivanov, Benjamin Rothenberger, Arnaud Dethise, Marco Canini, Torsten Hoefler, Adrian Perrig | Published: 2022-09-07 2022.09.07 2025.05.28 Literature Database
Classification Protocols with Minimal Disclosure Authors: Jinshuo Dong, Jason Hartline, Aravindan Vijayaraghavan | Published: 2022-09-06 2022.09.06 2025.05.28 Literature Database
Avast-CTU Public CAPE Dataset Authors: Branislav Bosansky, Dominik Kouba, Ondrej Manhal, Thorsten Sick, Viliam Lisy, Jakub Kroustek, Petr Somol | Published: 2022-09-06 2022.09.06 2025.05.28 Literature Database
RX-ADS: Interpretable Anomaly Detection using Adversarial ML for Electric Vehicle CAN data Authors: Chathurika S. Wickramasinghe, Daniel L. Marino, Harindra S. Mavikumbure, Victor Cobilean, Timothy D. Pennington, Benny J. Varghese, Craig Rieger, Milos Manic | Published: 2022-09-05 2022.09.05 2025.05.28 Literature Database
“Is your explanation stable?”: A Robustness Evaluation Framework for Feature Attribution Authors: Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang | Published: 2022-09-05 2022.09.05 2025.05.28 Literature Database
Beyond Random Split for Assessing Statistical Model Performance Authors: Carlos Catania, Jorge Guerra, Juan Manuel Romero, Gabriel Caffaratti, Martin Marchetta | Published: 2022-09-04 2022.09.04 2025.05.28 Literature Database
Joint Linear and Nonlinear Computation across Functions for Efficient Privacy-Preserving Neural Network Inference Authors: Qiao Zhang, Tao Xiang, Chunsheng Xin, Biwen Chen, Hongyi Wu | Published: 2022-09-04 2022.09.04 2025.05.28 Literature Database
PhishClone: Measuring the Efficacy of Cloning Evasion Attacks Authors: Arthur Wong, Alsharif Abuadbba, Mahathir Almashor, Salil Kanhere | Published: 2022-09-04 2022.09.04 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 2022.09.04 2025.05.28 Literature Database