Adversarial Training Should Be Cast as a Non-Zero-Sum Game Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18 AlgorithmAdversarial ExampleOptimization Methods 2023.06.19 2025.05.28 Literature Database
Cyber Key Terrain Identification Using Adjusted PageRank Centrality Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24 AlgorithmTime Window AnalysisComputational Efficiency 2023.06.19 2025.05.28 Literature Database
Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17 AlgorithmDeep Learning MethodFederated Learning 2023.06.17 2025.05.28 Literature Database
Evaluating Superhuman Models with Consistency Checks Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19 LLM Performance EvaluationAlgorithmEvaluation Method 2023.06.16 2025.05.28 Literature Database
Inroads into Autonomous Network Defence using Explained Reinforcement Learning Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15 AlgorithmSimulation Result EvaluationDeep Learning Method 2023.06.15 2025.05.28 Literature Database
Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language Models Authors: Myles Foley, Ambrish Rawat, Taesung Lee, Yufang Hou, Gabriele Picco, Giulio Zizzo | Published: 2023-06-15 LLM Performance EvaluationAlgorithmPrompt Injection 2023.06.15 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16 AlgorithmMembership InferenceComputational Efficiency 2023.06.14 2025.05.28 Literature Database
ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13 AlgorithmResource Scarcity IssuesCryptography 2023.06.13 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 AlgorithmChallenges of Log AnalysisFeature Extraction Method 2023.06.07 2025.05.28 Literature Database