Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15 Algorithm DesignRobustness EvaluationEfficient Resolution of Learning Tasks 2023.07.15 2025.05.28 Literature Database
Differentially Private Clustering in Data Streams Authors: Alessandro Epasto, Tamalika Mukherjee, Peilin Zhong | Published: 2023-07-14 | Updated: 2024-01-08 Algorithm DesignScalability AnalysisData Obfuscation 2023.07.14 2025.05.28 Literature Database
Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases Authors: Sajani Vithana, Sennur Ulukus | Published: 2023-07-12 Algorithm DesignData Integrity ConstraintsEfficiency Evaluation 2023.07.12 2025.05.28 Literature Database
ConFL: Constraint-guided Fuzzing for Machine Learning Framework Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11 Algorithm DesignFuzzingPerformance Evaluation 2023.07.11 2025.05.28 Literature Database
Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08 Algorithm DesignSecurity AssuranceData Obfuscation 2023.07.08 2025.05.28 Literature Database
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04 Algorithm DesignComputational ComplexityWatermark Robustness 2023.07.04 2025.05.28 Literature Database
Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04 Algorithm DesignDataset GenerationData Obfuscation 2023.07.04 2025.05.28 Literature Database
New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08 Algorithm DesignSecurity AssuranceReinforcement Learning Environment 2023.07.02 2025.05.28 Literature Database