Personalized Federated Learning Techniques: Empirical Analysis Authors: Azal Ahmad Khan, Ahmad Faraz Khan, Haider Ali, Ali Anwar | Published: 2024-09-10 Model Performance EvaluationPersonalization MethodCommunication Efficiency 2024.09.10 2025.05.27 Literature Database
Ransomware Detection Using Machine Learning in the Linux Kernel Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10 System ObservabilityRansomware AssessmentMachine Learning Method 2024.09.10 2025.05.27 Literature Database
HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz | Published: 2024-09-10 Code GenerationVulnerability ManagementAutomated Vulnerability Remediation 2024.09.10 2025.05.27 Literature Database
A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption Authors: Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas | Published: 2024-09-10 Privacy ProtectionCryptographyCommunication Efficiency 2024.09.10 2025.05.27 Literature Database
VoiceWukong: Benchmarking Deepfake Voice Detection Authors: Ziwei Yan, Yanjie Zhao, Haoyu Wang | Published: 2024-09-10 Deep Fake Audio EvaluationEvaluation MethodSpeech Synthesis Technology 2024.09.10 2025.05.27 Literature Database
On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10 WatermarkingAttack MethodWatermark Robustness 2024.09.10 2025.05.27 Literature Database
Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09 Privacy ProtectionPrivacy Protection MethodAgricultural Data Privacy 2024.09.09 2025.05.27 Literature Database
Using Large Language Models for Template Detection from Security Event Logs Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-04-14 LLM Performance EvaluationAlgorithmEvaluation Method 2024.09.08 2025.05.27 Literature Database
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20 Backdoor AttackPoisoningEvaluation Method 2024.09.08 2025.05.27 Literature Database
MILE: A Mutation Testing Framework of In-Context Learning Systems Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07 Few-Shot LearningMutation TestingEvaluation Method 2024.09.07 2025.05.27 Literature Database