Algorithm

An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks

Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15
Algorithm
Malware Classification
攻撃戦略分析

Inducing Uncertainty for Test-Time Privacy

Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15
Algorithm
Data Curation
Model evaluation methods

Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution

Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15
Algorithm
脅威モデリング自動化
Federated Learning

Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector

Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11
Algorithm
Data Collection Method
Phishing Detection

What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets

Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11
Algorithm
Network Forensics
Anomaly Detection Algorithm

ENSI: Efficient Non-Interactive Secure Inference for Large Language Models

Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11
Algorithm
Model Inversion
Efficiency Evaluation

Towards Confidential and Efficient LLM Inference with Dual Privacy Protection

Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11
Algorithm
Privacy Technique
Differential Privacy

Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption

Authors: Zhang Ruoyan, Zheng Zhongxiang, Bao Wankang | Published: 2025-01-03 | Updated: 2025-01-07
Algorithm
Privacy Protection

SPDZCoder: Combining Expert Knowledge with LLMs for Generating Privacy-Computing Code

Authors: Xiaoning Dong, Peilin Xin, Jia Li, Wei Xu | Published: 2024-12-31 | Updated: 2025-03-21
Algorithm
Program Interpretation Graph
Multi-Party Computation

Robust Matrix Completion for Discrete Rating-Scale Data

Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30
Algorithm
Simulation Result Evaluation