Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 2024.05.18 2025.05.12 Literature Database
SMARD: A Cost Effective Smart Agro Development Technology for Crops Disease Classification Authors: Tanoy Debnath, Shadman Wadith, Anichur Rahman | Published: 2024-05-17 2024.05.17 2025.05.12 Literature Database
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17 2024.05.17 2025.05.12 Literature Database
Dealing Doubt: Unveiling Threat Models in Gradient Inversion Attacks under Federated Learning, A Survey and Taxonomy Authors: Yichuan Shi, Olivera Kotevska, Viktor Reshniak, Abhishek Singh, Ramesh Raskar | Published: 2024-05-16 2024.05.16 2025.05.12 Literature Database
The Effect of Quantization in Federated Learning: A Rényi Differential Privacy Perspective Authors: Tianqu Kang, Lumin Liu, Hengtao He, Jun Zhang, S. H. Song, Khaled B. Letaief | Published: 2024-05-16 2024.05.16 2025.05.12 Literature Database
Learnable Privacy Neurons Localization in Language Models Authors: Ruizhe Chen, Tianxiang Hu, Yang Feng, Zuozhu Liu | Published: 2024-05-16 2024.05.16 2025.05.12 Literature Database
Transfer Learning in Pre-Trained Large Language Models for Malware Detection Based on System Calls Authors: Pedro Miguel Sánchez Sánchez, Alberto Huertas Celdrán, Gérôme Bovet, Gregorio Martínez Pérez | Published: 2024-05-15 2024.05.15 2025.05.12 Literature Database
Cross-Input Certified Training for Universal Perturbations Authors: Changming Xu, Gagandeep Singh | Published: 2024-05-15 | Updated: 2024-09-09 2024.05.15 2025.05.12 Literature Database
Towards Next-Generation Steganalysis: LLMs Unleash the Power of Detecting Steganography Authors: Minhao Bai. Jinshuai Yang, Kaiyi Pang, Huili Wang, Yongfeng Huang | Published: 2024-05-15 2024.05.15 2025.05.12 Literature Database
The Pitfalls and Promise of Conformal Inference Under Adversarial Attacks Authors: Ziquan Liu, Yufei Cui, Yan Yan, Yi Xu, Xiangyang Ji, Xue Liu, Antoni B. Chan | Published: 2024-05-14 2024.05.14 2025.05.12 Literature Database