Privacy-Preserving UCB Decision Process Verification via zk-SNARKs Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06 AlgorithmWatermarkingPrivacy Protection 2024.04.18 2025.05.27 Literature Database
Large Language Models for Blockchain Security: A Systematic Literature Review Authors: Zheyuan He, Zihao Li, Sen Yang, He Ye, Ao Qiao, Xiaosong Zhang, Xiapu Luo, Ting Chen | Published: 2024-03-21 | Updated: 2025-03-24 LLM SecurityAlgorithmBlockchain Technology 2024.03.21 2025.05.27 Literature Database
SAP: Corrective Machine Unlearning with Scaled Activation Projection for Label Noise Robustness Authors: Sangamesh Kodge, Deepak Ravikumar, Gobinda Saha, Kaushik Roy | Published: 2024-03-13 | Updated: 2025-01-02 AlgorithmWatermarkingLabel 2024.03.13 2025.05.27 Literature Database
DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16 AlgorithmAdversarial TrainingWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
ACW: Enhancing Traceability of AI-Generated Codes Based on Watermarking Authors: Boquan Li, Mengdi Zhang, Peixin Zhang, Jun Sun, Xingmei Wang, Zirui Fu | Published: 2024-02-12 | Updated: 2024-08-21 AlgorithmWatermarkingWatermark Evaluation 2024.02.12 2025.05.27 Literature Database
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Dynamic Incremental Optimization for Best Subset Selection Authors: Shaogang Ren, Xiaoning Qian | Published: 2024-02-04 | Updated: 2024-12-30 AlgorithmSparse ModelOptimization Methods 2024.02.04 2025.05.27 Literature Database
algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01 AlgorithmWebsite VulnerabilityCybersecurity 2024.02.01 2025.05.27 Literature Database
Unlearnable Algorithms for In-context Learning Authors: Andrei Muresanu, Anvith Thudi, Michael R. Zhang, Nicolas Papernot | Published: 2024-02-01 Few-Shot LearningAlgorithmMachine Unlearning 2024.02.01 2025.05.27 Literature Database
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 AlgorithmWatermarkingCyber Attack 2024.01.27 2025.05.27 Literature Database