Byzantine-Robust Gossip: Insights from a Dual Approach

Authors: Renaud Gaucher, Hadrien Hendrikx, Aymeric Dieuleveut | Published: 2024-05-06

SEvenLLM: Benchmarking, Eliciting, and Enhancing Abilities of Large Language Models in Cyber Threat Intelligence

Authors: Hangyuan Ji, Jian Yang, Linzheng Chai, Chaoren Wei, Liqun Yang, Yunlong Duan, Yunli Wang, Tianzhen Sun, Hongcheng Guo, Tongliang Li, Changyu Ren, Zhoujun Li | Published: 2024-05-06 | Updated: 2024-06-03

Online Clustering of Known and Emerging Malware Families

Authors: Olha Jurečková, Martin Jureček, Mark Stamp | Published: 2024-05-06

Powering the Future of IoT: Federated Learning for Optimized Power Consumption and Enhanced Privacy

Authors: Ghazaleh Shirvani, Saeid Ghasemshirazi | Published: 2024-05-05

Explainable Malware Detection with Tailored Logic Explained Networks

Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05

Confidential and Protected Disease Classifier using Fully Homomorphic Encryption

Authors: Aditya Malik, Nalini Ratha, Bharat Yalavarthi, Tilak Sharma, Arjun Kaushik, Charanjit Jutla | Published: 2024-05-05

Updating Windows Malware Detectors: Balancing Robustness and Regression against Adversarial EXEmples

Authors: Matous Kozak, Luca Demetrio, Dmitrijs Trizna, Fabio Roli | Published: 2024-05-04

ProFLingo: A Fingerprinting-based Intellectual Property Protection Scheme for Large Language Models

Authors: Heng Jin, Chaoyu Zhang, Shanghao Shi, Wenjing Lou, Y. Thomas Hou | Published: 2024-05-03 | Updated: 2024-09-10

ModelShield: Adaptive and Robust Watermark against Model Extraction Attack

Authors: Kaiyi Pang, Tao Qi, Chuhan Wu, Minhao Bai, Minghu Jiang, Yongfeng Huang | Published: 2024-05-03 | Updated: 2025-01-12

Explainability Guided Adversarial Evasion Attacks on Malware Detectors

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam, Moustafa Saleh | Published: 2024-05-02