SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07 2025.03.05 2025.05.27 Literature Database
PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Hybrid Secret Sharing Authors: Zhichao You, Xuewen Dong, Ke Cheng, Xutong Mu, Jiaxuan Fu, Shiyang Ma, Qiang Qu, Yulong Shen | Published: 2025-03-05 | Updated: 2025-05-14 2025.03.05 2025.05.28 Literature Database
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 2025.03.05 2025.05.27 Literature Database
Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection Authors: Ragini Gupta, Shinan Liu, Ruixiao Zhang, Xinyue Hu, Xiaoyang Wang, Hadjer Benkraouda, Pranav Kommaraju, Nick Feamster, Klara Nahrstedt | Published: 2025-03-04 | Updated: 2025-08-13 2025.03.04 2025.08.15 Literature Database
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 2025.03.04 2025.05.27 Literature Database
Privacy-preserving Machine Learning in Internet of Vehicle Applications: Fundamentals, Recent Advances, and Future Direction Authors: Nazmul Islam, Mohammad Zulkernine | Published: 2025-03-03 | Updated: 2025-07-08 2025.03.03 2025.07.10 Literature Database
TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions Authors: Wang YuHang, Junkang Guo, Aolei Liu, Kaihao Wang, Zaitong Wu, Zhenyu Liu, Wenfei Yin, Jian Liu | Published: 2025-03-02 | Updated: 2025-03-21 2025.03.02 2025.05.27 Literature Database
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 2025.03.01 2025.05.27 Literature Database
Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25 2025.02.28 2025.08.27 Literature Database
Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16 2025.02.28 2025.05.27 Literature Database