Differentially Private Federated Learning: A Systematic Review Authors: Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao | Published: 2024-05-14 | Updated: 2024-05-20 2024.05.14 2025.05.12 Literature Database
Adversarial Machine Learning Threats to Spacecraft Authors: Rajiv Thummala, Shristi Sharma, Matteo Calabrese, Gregory Falco | Published: 2024-05-14 2024.05.14 2025.05.12 Literature Database
DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13 2024.05.13 2025.05.12 Literature Database
Oedipus: LLM-enchanced Reasoning CAPTCHA Solver Authors: Gelei Deng, Haoran Ou, Yi Liu, Jie Zhang, Tianwei Zhang, Yang Liu | Published: 2024-05-13 2024.05.13 2025.05.12 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 2024.05.12 2025.05.12 Literature Database
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 2024.05.12 2025.05.12 Literature Database
PLeak: Prompt Leaking Attacks against Large Language Model Applications Authors: Bo Hui, Haolin Yuan, Neil Gong, Philippe Burlina, Yinzhi Cao | Published: 2024-05-10 | Updated: 2024-05-14 2024.05.10 2025.05.12 Literature Database
Risks of Practicing Large Language Models in Smart Grid: Threat Modeling and Validation Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Sun | Published: 2024-05-10 | Updated: 2025-04-21 2024.05.10 2025.05.12 Literature Database
Concealing Backdoor Model Updates in Federated Learning by Trigger-Optimized Data Poisoning Authors: Yujie Zhang, Neil Gong, Michael K. Reiter | Published: 2024-05-10 | Updated: 2024-09-09 2024.05.10 2025.05.12 Literature Database
Demystifying Behavior-Based Malware Detection at Endpoints Authors: Yigitcan Kaya, Yizheng Chen, Shoumik Saha, Fabio Pierazzi, Lorenzo Cavallaro, David Wagner, Tudor Dumitras | Published: 2024-05-09 2024.05.09 2025.05.12 Literature Database