Optimization of Lightweight Malware Detection Models For AIoT Devices Authors: Felicia Lo, Shin-Ming Cheng, Rafael Kaliski | Published: 2024-04-06 2024.04.06 2025.05.12 Literature Database
Fine-Tuning, Quantization, and LLMs: Navigating Unintended Outcomes Authors: Divyanshu Kumar, Anurakt Kumar, Sahil Agarwal, Prashanth Harshangi | Published: 2024-04-05 | Updated: 2024-09-09 2024.04.05 2025.05.12 Literature Database
Prompt Public Large Language Models to Synthesize Data for Private On-device Applications Authors: Shanshan Wu, Zheng Xu, Yanxiang Zhang, Yuanbo Zhang, Daniel Ramage | Published: 2024-04-05 | Updated: 2024-08-07 2024.04.05 2025.05.12 Literature Database
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05 2024.04.05 2025.05.12 Literature Database
Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça | Published: 2024-04-05 2024.04.05 2025.05.12 Literature Database
Precision Guided Approach to Mitigate Data Poisoning Attacks in Federated Learning Authors: K Naveen Kumar, C Krishna Mohan, Aravind Machiry | Published: 2024-04-05 2024.04.05 2025.05.12 Literature Database
AuditGPT: Auditing Smart Contracts with ChatGPT Authors: Shihao Xia, Shuai Shao, Mengting He, Tingting Yu, Linhai Song, Yiying Zhang | Published: 2024-04-05 2024.04.05 2025.05.12 Literature Database
An Investigation into Misuse of Java Security APIs by Large Language Models Authors: Zahra Mousavi, Chadni Islam, Kristen Moore, Alsharif Abuadbba, Muhammad Ali Babar | Published: 2024-04-04 2024.04.04 2025.05.12 Literature Database
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning Authors: Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue | Published: 2024-04-04 2024.04.04 2025.05.12 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 2024.04.04 2025.05.12 Literature Database