Literature Database

Multistatic-Radar RCS-Signature Recognition of Aerial Vehicles: A Bayesian Fusion Approach

Authors: Michael Potter, Murat Akcakaya, Marius Necsoiu, Gunar Schirner, Deniz Erdogmus, Tales Imbiriba | Published: 2024-02-28 | Updated: 2024-08-16
Training Data Generation
Bayesian Classification
Machine Learning Method

Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates

Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29
Model Design
Robustness Evaluation
Adversarial Learning

An Investigation into the Performances of the State-of-the-art Machine Learning Approaches for Various Cyber-attack Detection: A Survey

Authors: Tosin Ige, Christopher Kiekintveld, Aritran Piplai | Published: 2024-02-26 | Updated: 2024-05-10
SQL Injection Attack Detection
Phishing Detection
Machine Learning Method

Improving behavior based authentication against adversarial attack using XAI

Authors: Dong Qin, George Amariucai, Daji Qiao, Yong Guan | Published: 2024-02-26 | Updated: 2024-03-10
Adversarial Training
Feature Selection Method
Defense Method

LLMs Can Defend Themselves Against Jailbreaking in a Practical Manner: A Vision Paper

Authors: Daoyuan Wu, Shuai Wang, Yang Liu, Ning Liu | Published: 2024-02-24 | Updated: 2024-03-04
LLM Security
Prompt Injection
Prompt Engineering

On Trojan Signatures in Large Language Models of Code

Authors: Aftab Hussain, Md Rafiqul Islam Rabin, Mohammad Amin Alipour | Published: 2024-02-23 | Updated: 2024-03-07
LLM Security
Trojan Horse Signature
Trojan Detection

Verifiable Boosted Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22
Model Performance Evaluation
Robustness Evaluation
Optimization Problem

BIONIB: Blockchain-based IoT using Novelty Index in Bridge Health Monitoring

Authors: Divija Swetha Gadiraju, Ryan McMaster, Saeed Eftekhar Azam, Deepak Khazanchi | Published: 2024-02-22
Scalability Analysis
Blockchain Technology
Bridge Monitoring

Federated Learning on Transcriptomic Data: Model Quality and Performance Trade-Offs

Authors: Anika Hannemann, Jan Ewald, Leo Seeger, Erik Buchmann | Published: 2024-02-22
Data Privacy Assessment
Data Preprocessing
Federated Learning

Closed-Form Bounds for DP-SGD against Record-level Inference

Authors: Giovanni Cherubin, Boris Köpf, Andrew Paverd, Shruti Tople, Lukas Wutschitz, Santiago Zanella-Béguelin | Published: 2024-02-22
Privacy Protection Method
Bayesian Security
Membership Inference