Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30 Spam DetectionSelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Label-Only Model Inversion Attacks via Knowledge Transfer Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30 Privacy TechniqueAttack EvaluationDeep Learning Method 2023.10.30 2025.05.28 Literature Database
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30 Data GenerationPrivacy TechniqueExperimental Validation 2023.10.30 2025.05.28 Literature Database
From Chatbots to PhishBots? — Preventing Phishing scams created using ChatGPT, Google Bard and Claude Authors: Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh | Published: 2023-10-29 | Updated: 2024-03-10 Dataset GenerationDetection Rate of Phishing AttacksPrompt Injection 2023.10.29 2025.05.28 Literature Database
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 Poisoning attack on RAGPoisoningAdversarial Example 2023.10.29 2025.05.28 Literature Database
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 Security AnalysisBackdoor AttackClassification of Malicious Actors 2023.10.29 2025.05.28 Literature Database
Temperature Monitoring of Agricultural Areas in a Secure Data Room Authors: Thomas Ederer, Martin Ivancsits, Igor Ivkić | Published: 2023-10-27 Citizen ScienceClimate Data CollectionClimate Information 2023.10.27 2025.05.28 Literature Database
PubDef: Defending Against Transfer Attacks From Public Models Authors: Chawin Sitawarin, Jaewon Chang, David Huang, Wesson Altoyan, David Wagner | Published: 2023-10-26 | Updated: 2024-03-17 Adversarial attackAdversarial TrainingDefense Method 2023.10.26 2025.05.28 Literature Database
Instability of computer vision models is a necessary result of the task itself Authors: Oliver Turnbull, George Cevora | Published: 2023-10-26 Robustness EvaluationAdversarial ExampleDimensionality Reduction Method 2023.10.26 2025.05.28 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database