SoK: Adversarial Evasion Attacks Practicality in NIDS Domain and the Impact of Dynamic Learning Authors: Mohamed elShehaby, Ashraf Matrawy | Published: 2023-06-08 | Updated: 2025-10-16 Network Traffic AnalysisCertified Robustness攻撃者のアプローチ 2023.06.08 2025.10.18 Literature Database
FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06 PoisoningMulti-Party ComputationFederated Learning 2023.06.08 2025.05.28 Literature Database
Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12 Privacy AnalysisMembership InferenceModel Architecture 2023.06.08 2025.05.28 Literature Database
Machine Learning in Digital Forensics: A Systematic Literature Review Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08 WatermarkingData Extraction and AnalysisImage Forensics 2023.06.08 2025.05.28 Literature Database
Flow-based Network Intrusion Detection Based on BERT Masked Language Model Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-06-08 Dataset GenerationModel Design and AccuracyIntrusion Detection System 2023.06.08 2025.05.28 Literature Database
Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13 WatermarkingEnergy ManagementAttack Evaluation 2023.06.08 2025.05.28 Literature Database
Differentially Private Selection from Secure Distributed Computing Authors: Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh | Published: 2023-06-07 | Updated: 2023-06-08 MPC AlgorithmScalability AnalysisPrivacy Enhancing Technology 2023.06.07 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 AlgorithmChallenges of Log AnalysisFeature Extraction Method 2023.06.07 2025.05.28 Literature Database
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18 LLM ApplicationPrompt InjectionLiterature List 2023.06.07 2025.05.28 Literature Database