Multistatic-Radar RCS-Signature Recognition of Aerial Vehicles: A Bayesian Fusion Approach Authors: Michael Potter, Murat Akcakaya, Marius Necsoiu, Gunar Schirner, Deniz Erdogmus, Tales Imbiriba | Published: 2024-02-28 | Updated: 2024-08-16 Training Data GenerationBayesian ClassificationMachine Learning Method 2024.02.28 2025.05.27 Literature Database
Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29 Model DesignRobustness EvaluationAdversarial Learning 2024.02.27 2025.05.31 Literature Database
An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai | Published: 2024-02-26 | Updated: 2024-05-10 SQL Injection Attack DetectionPhishing DetectionMachine Learning Method 2024.02.26 2025.05.27 Literature Database
Improving behavior based authentication against adversarial attack using XAI Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10 Adversarial TrainingFeature Selection MethodDefense Method 2024.02.26 2025.05.27 Literature Database
LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper Authors: Daoyuan Wu, Shuai Wang, Yang Liu, Ning Liu | Published: 2024-02-24 | Updated: 2024-03-04 LLM SecurityPrompt InjectionPrompt Engineering 2024.02.24 2025.05.27 Literature Database
On Trojan Signatures in Large Language Models of Code Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07 LLM SecurityTrojan Horse SignatureTrojan Detection 2024.02.23 2025.05.27 Literature Database
Verifiable Boosted Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22 Model Performance EvaluationRobustness EvaluationOptimization Problem 2024.02.22 2025.05.27 Literature Database
BIONIB: Blockchain-based IoT using Novelty Index in Bridge Health Monitoring Authors: Divija Swetha Gadiraju, Ryan McMaster, Saeed Eftekhar Azam, Deepak Khazanchi | Published: 2024-02-22 Scalability AnalysisBlockchain TechnologyBridge Monitoring 2024.02.22 2025.05.27 Literature Database
Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs Authors: Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann | Published: 2024-02-22 Data Privacy AssessmentData PreprocessingFederated Learning 2024.02.22 2025.05.27 Literature Database
Closed-Form Bounds for DP-SGD against Record-level Inference Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin | Published: 2024-02-22 Privacy Protection MethodBayesian SecurityMembership Inference 2024.02.22 2025.05.27 Literature Database