Unlearning Backdoor Attacks through Gradient-Based Model Pruning Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak | Published: 2024-05-07 2024.05.07 2025.05.12 Literature Database
Enhancing O-RAN Security: Evasion Attacks and Robust Defenses for Graph Reinforcement Learning-based Connection Management Authors: Ravikumar Balakrishnan, Marius Arvinte, Nageen Himayat, Hosein Nikopour, Hassnaa Moustafa | Published: 2024-05-06 2024.05.06 2025.05.12 Literature Database
The Federation Strikes Back: A Survey of Federated Learning Privacy Attacks, Defenses, Applications, and Policy Landscape Authors: Joshua C. Zhao, Saurabh Bagchi, Salman Avestimehr, Kevin S. Chan, Somali Chaterji, Dimitris Dimitriadis, Jiacheng Li, Ninghui Li, Arash Nourian, Holger R. Roth | Published: 2024-05-06 | Updated: 2025-03-22 2024.05.06 2025.05.12 Literature Database
Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12 2024.05.06 2025.05.12 Literature Database
Byzantine-Robust Gossip: Insights from a Dual Approach Authors: Renaud Gaucher, Hadrien Hendrikx, Aymeric Dieuleveut | Published: 2024-05-06 2024.05.06 2025.05.12 Literature Database
SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03 2024.05.06 2025.05.12 Literature Database
Online Clustering of Known and Emerging Malware Families Authors: Olha Jurečková, Martin Jureček, Mark Stamp | Published: 2024-05-06 2024.05.06 2025.05.12 Literature Database
Powering the Future of IoT: Federated Learning for Optimized Power Consumption and Enhanced Privacy Authors: Ghazaleh Shirvani, Saeid Ghasemshirazi | Published: 2024-05-05 2024.05.05 2025.05.12 Literature Database
Explainable Malware Detection with Tailored Logic Explained Networks Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05 2024.05.05 2025.05.12 Literature Database
Confidential and Protected Disease Classifier using Fully Homomorphic Encryption Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05 2024.05.05 2025.05.12 Literature Database