Literature Database

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11
Algorithm Design
Fuzzing
Performance Evaluation

ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown

Authors: Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard | Published: 2023-07-10
Data Generation
Digital Forensics
Prompt Engineering

Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey

Authors: Dongqi Fu, Wenxuan Bao, Ross Maciejewski, Hanghang Tong, Jingrui He | Published: 2023-07-10
Privacy Enhancing Technology
Membership Inference
Federated Learning

Robust Ranking Explanations

Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08
Robustness Evaluation
Threat modeling
Explainability

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation

A Natural Language Processing Approach to Malware Classification

Authors: Ritik Mehta, Olha Jurečková, Mark Stamp | Published: 2023-07-07
Malware Classification Using CNN
Malware Detection Method
Efficient Resolution of Learning Tasks

Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation

Authors: Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong | Published: 2023-07-05
Control Action Generation
Vehicle Network
Federated Learning

Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05
Security Assurance
Prompt Injection
Adversarial Attack Methods

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05
Code Change Analysis
System Observability
Security Assurance

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
Algorithm Design
Computational Complexity
Watermark Robustness