Algorithm Design

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples

Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05
Algorithm
Algorithm Design
Dataset Generation

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method

On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms

Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15
Algorithm Design
Robustness Evaluation
Efficient Resolution of Learning Tasks

Differentially Private Clustering in Data Streams

Authors: Alessandro Epasto, Tamalika Mukherjee, Peilin Zhong | Published: 2023-07-14 | Updated: 2024-01-08
Algorithm Design
Scalability Analysis
Data Obfuscation

Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases

Authors: Sajani Vithana, Sennur Ulukus | Published: 2023-07-12
Algorithm Design
Data Integrity Constraints
Efficiency Evaluation

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11
Algorithm Design
Fuzzing
Performance Evaluation

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04
Algorithm Design
Computational Complexity
Watermark Robustness

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04
Algorithm Design
Dataset Generation
Data Obfuscation

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08
Algorithm Design
Security Assurance
Reinforcement Learning Environment