Literature Database

Personalized Federated Learning Techniques: Empirical Analysis

Authors: Azal Ahmad Khan, Ahmad Faraz Khan, Haider Ali, Ali Anwar | Published: 2024-09-10
Model Performance Evaluation
Personalization Method
Communication Efficiency

Ransomware Detection Using Machine Learning in the Linux Kernel

Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10
System Observability
Ransomware Assessment
Machine Learning Method

HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz | Published: 2024-09-10
Code Generation
Vulnerability Management
Automated Vulnerability Remediation

A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption

Authors: Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas | Published: 2024-09-10
Privacy Protection
Cryptography
Communication Efficiency

VoiceWukong: Benchmarking Deepfake Voice Detection

Authors: Ziwei Yan, Yanjie Zhao, Haoyu Wang | Published: 2024-09-10
Deep Fake Audio Evaluation
Evaluation Method
Speech Synthesis Technology

On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective

Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10
Watermarking
Attack Method
Watermark Robustness

Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research

Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09
Privacy Protection
Privacy Protection Method
Agricultural Data Privacy

Using Large Language Models for Template Detection from Security Event Logs

Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-04-14
LLM Performance Evaluation
Algorithm
Evaluation Method

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20
Backdoor Attack
Poisoning
Evaluation Method

MILE: A Mutation Testing Framework of In-Context Learning Systems

Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07
Few-Shot Learning
Mutation Testing
Evaluation Method