Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02 WatermarkingWatermark RobustnessWatermark Evaluation 2024.10.02 2025.05.27 Literature Database
On Using Certified Training towards Empirical Robustness Authors: Alessandro De Palma, Serge Durand, Zakaria Chihani, François Terrier, Caterina Urban | Published: 2024-10-02 | Updated: 2025-03-24 Adversarial ExampleRegularization 2024.10.02 2025.05.27 Literature Database
Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06 CybersecurityNetwork Threat Detection 2024.10.01 2025.05.27 Literature Database
Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01 Backdoor AttackPoisoningLinear Solver 2024.10.01 2025.05.27 Literature Database
Timber! Poisoning Decision Trees Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01 Backdoor AttackPoisoning 2024.10.01 2025.05.27 Literature Database
Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism Authors: Noah Kader, Inwon Kang, Oshani Seneviratne | Published: 2024-10-01 Phishing Detection 2024.10.01 2025.05.27 Literature Database
An interdisciplinary exploration of trade-offs between energy, privacy and accuracy aspects of data Authors: Pepijn de Reus, Kyra Dresen, Ana Oprescu, Kristina Irion, Ans Kolk | Published: 2024-09-30 | Updated: 2024-10-12 Privacy ProtectionPrivacy Technique 2024.09.30 2025.05.27 Literature Database
Robust LLM safeguarding via refusal feature adversarial training Authors: Lei Yu, Virginie Do, Karen Hambardzumyan, Nicola Cancedda | Published: 2024-09-30 | Updated: 2025-03-20 Prompt InjectionModel RobustnessAdversarial Learning 2024.09.30 2025.05.27 Literature Database
The Early Bird Catches the Leak: Unveiling Timing Side Channels in LLM Serving Systems Authors: Linke Song, Zixuan Pang, Wenhao Wang, Zihao Wang, XiaoFeng Wang, Hongbo Chen, Wei Song, Yier Jin, Dan Meng, Rui Hou | Published: 2024-09-30 | Updated: 2025-08-13 Security AssurancePrompt leaking攻撃戦略分析 2024.09.30 2025.08.15 Literature Database
Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning Authors: Ye Li, Yanchao Zhao, Chengcheng Zhu, Jiale Zhang | Published: 2024-09-29 | Updated: 2025-03-22 ID Mapping ConstructionBackdoor DetectionAdversarial attack 2024.09.29 2025.05.27 Literature Database