Literature Database

Intrusion Detection based on Federated Learning: a systematic review

Authors: Jose L. Hernandez-Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Marmol, Aurora Gonzalez-Vidal, Georgios Kambourakis | Published: 2023-08-18
Model Performance Evaluation
Intrusion Detection System
Federated Learning

Balancing Transparency and Risk: The Security and Privacy Risks of Open-Source Machine Learning Models

Authors: Dominik Hintersdorf, Lukas Struppek, Kristian Kersting | Published: 2023-08-18
AI Compliance
Cybersecurity
Data Privacy Assessment

A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums

Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18
Data Collection
Model Performance Evaluation
Machine Learning Technology

Artificial Intelligence for Web 3.0: A Comprehensive Survey

Authors: Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin, Shen | Published: 2023-08-17
Data Protection Method
Privacy Technique
Deep Learning Method

An Effective Deep Learning Based Multi-Class Classification of DoS and DDoS Attack Detection

Authors: Arun Kumar Silivery, Kovvur Ram Mohan Rao, L K Suresh Kumar | Published: 2023-08-17
DDoS Attack
Intrusion Detection System
Deep Learning Method

Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service

Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17
Watermarking
Cryptography
Machine Learning Method

Test-Time Poisoning Attacks Against Test-Time Adaptation Models

Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16
Poisoning
Model Performance Evaluation
Attack Evaluation

Time Travel in LLMs: Tracing Data Contamination in Large Language Models

Authors: Shahriar Golchin, Mihai Surdeanu | Published: 2023-08-16 | Updated: 2024-02-21
Data Contamination Detection
Prompt Injection
Natural Language Processing

Diff-CAPTCHA: An Image-based CAPTCHA with Security Enhanced by Denoising Diffusion Model

Authors: Ran Jiang, Sanfeng Zhang, Linfeng Liu, Yanbing Peng | Published: 2023-08-16
Security Assurance
Attack Evaluation
Watermark Robustness

Robustness Over Time: Understanding Adversarial Examples’ Effectiveness on Longitudinal Versions of Large Language Models

Authors: Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-08-15 | Updated: 2024-05-06
Prompt Injection
Model Performance Evaluation
Robustness Evaluation