Literature Database

Decentralised and collaborative machine learning framework for IoT

Authors: Martín González-Soto, Rebeca P. Díaz-Redondo, Manuel Fernández-Veiga, Bruno Rodríguez-Castro, Ana Fernández-Vilas | Published: 2023-12-19
Online Learning
Prototype Network
Federated Learning

Towards an in-depth detection of malware using distributed QCNN

Authors: Tony Quertier, Grégoire Barrué | Published: 2023-12-19
Algorithm
Model Performance Evaluation
Quantum Machine Learning

EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property Protection

Authors: Xin Mu, Yu Wang, Zhengan Huang, Junzuo Lai, Yehong Zhang, Hui Wang, Yue Yu | Published: 2023-12-19
Watermarking
Model Performance Evaluation
Watermark Robustness

Traces of Memorisation in Large Language Models for Code

Authors: Ali Al-Kaswan, Maliheh Izadi, Arie van Deursen | Published: 2023-12-18 | Updated: 2024-01-15
Dataset Generation
Data Leakage
Training Data Extraction Method

Ensuring Cross-Device Portability of Electromagnetic Side-Channel Analysis

Authors: Lojenaa Navanesana, Nhien-An Le-Khac, Mark Scanlon, Kasun De Zoysa, Asanka P. Sayakkara | Published: 2023-12-18
Cross-Device Portable Model
Cross-Device Analysis
Transfer Learning

A review of federated learning in renewable energy applications: Potential, challenges, and future directions

Authors: Albin Grataloup, Stefan Jonas, Angela Meyer | Published: 2023-12-18
Energy Management
Personalization Method
Federated Learning

Harnessing Inherent Noises for Privacy Preservation in Quantum Machine Learning

Authors: Keyi Ju, Xiaoqi Qin, Hui Zhong, Xinyue Zhang, Miao Pan, Baoling Liu | Published: 2023-12-18 | Updated: 2024-03-07
Privacy Protection
Privacy Protection Method
Quantum Machine Learning

Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication

Authors: Hyunmin Choi, Simon Woo, Hyoungshick Kim | Published: 2023-12-18 | Updated: 2024-04-01
Watermarking
Fingerprinting Method
Privacy Protection

A Comprehensive Survey of Attack Techniques, Implementation, and Mitigation Strategies in Large Language Models

Authors: Aysan Esmradi, Daniel Wankit Yip, Chun Fai Chan | Published: 2023-12-18
Cyber Attack
Prompt Injection
Attack Method

JailGuard: A Universal Detection Framework for LLM Prompt-based Attacks

Authors: Xiaoyu Zhang, Cen Zhang, Tianlin Li, Yihao Huang, Xiaojun Jia, Ming Hu, Jie Zhang, Yang Liu, Shiqing Ma, Chao Shen | Published: 2023-12-17 | Updated: 2025-03-15
Text Perturbation Method
Prompt Injection
Attack Method