Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15 Algorithm脅威モデリング自動化Federated Learning 2025.09.15 2025.09.17 Literature Database
Bridging the Gap in Phishing Detection: A Comprehensive Phishing Dataset Collector Authors: Aditya Kulkarni, Shahil Manishbhai Patel, Shivam Pradip Tirmare, Vivek Balachandran, Tamal Das | Published: 2025-09-11 AlgorithmData Collection MethodPhishing Detection 2025.09.11 2025.09.13 Literature Database
What Does Normal Even Mean? Evaluating Benign Traffic in Intrusion Detection Datasets Authors: Meghan Wilkinson, Robert H Thomson | Published: 2025-09-11 AlgorithmNetwork ForensicsAnomaly Detection Algorithm 2025.09.11 2025.09.13 Literature Database
ENSI: Efficient Non-Interactive Secure Inference for Large Language Models Authors: Zhiyu He, Maojiang Wang, Xinwen Gao, Yuchuan Luo, Lin Liu, Shaojing Fu | Published: 2025-09-11 AlgorithmModel InversionEfficiency Evaluation 2025.09.11 2025.09.13 Literature Database
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11 AlgorithmPrivacy TechniqueDifferential Privacy 2025.09.11 2025.09.13 Literature Database
Evaluating the Defense Potential of Machine Unlearning against Membership Inference Attacks Authors: Aristeidis Sidiropoulos, Christos Chrysanthos Nikolaidis, Theodoros Tsiolakis, Nikolaos Pavlidis, Vasilis Perifanis, Pavlos S. Efraimidis | Published: 2025-08-22 | Updated: 2025-09-17 AlgorithmPrivacy AnalysisEvaluation Method 2025.08.22 2025.09.19 Literature Database
AICrypto: A Comprehensive Benchmark for Evaluating Cryptography Capabilities of Large Language Models Authors: Yu Wang, Yijian Liu, Liheng Ji, Han Luo, Wenjie Li, Xiaofei Zhou, Chiyun Feng, Puji Wang, Yuhan Cao, Geyuan Zhang, Xiaojian Li, Rongwu Xu, Yilei Chen, Tianxing He | Published: 2025-07-13 | Updated: 2025-09-30 AlgorithmHallucinationPrompt validation 2025.07.13 2025.10.02 Literature Database
Practical Secure Inference Algorithm for Fine-tuned Large Language Model Based on Fully Homomorphic Encryption Authors: Zhang Ruoyan, Zheng Zhongxiang, Bao Wankang | Published: 2025-01-03 | Updated: 2025-01-07 AlgorithmPrivacy Protection 2025.01.03 2025.05.27 Literature Database
SPDZCoder: Combining Expert Knowledge with LLMs for Generating Privacy-Computing Code Authors: Xiaoning Dong, Peilin Xin, Jia Li, Wei Xu | Published: 2024-12-31 | Updated: 2025-03-21 AlgorithmProgram Interpretation GraphMulti-Party Computation 2024.12.31 2025.05.27 Literature Database
Robust Matrix Completion for Discrete Rating-Scale Data Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30 AlgorithmSimulation Result Evaluation 2024.12.30 2025.05.27 Literature Database