Hot PATE: Private Aggregation of Distributions for Diverse Task Authors: Edith Cohen, Benjamin Cohen-Wang, Xin Lyu, Jelani Nelson, Tamas Sarlos, Uri Stemmer | Published: 2023-12-04 | Updated: 2024-05-17 WatermarkingPrivacy Protection MethodComputational Efficiency 2023.12.04 2025.05.28 Literature Database
Breaking XOR Arbiter PUFs without Reliability Information Authors: Niloufar Sayadi, Phuong Ha Nguyen, Marten van Dijk, Chenglu Jin | Published: 2023-12-03 Evaluation Methods for PUFWatermarkingAttack Method 2023.12.03 2025.05.28 Literature Database
FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02 WatermarkingFraudulent TransactionWatermark Evaluation 2023.12.02 2025.05.28 Literature Database
Malicious code detection in android: the role of sequence characteristics and disassembling methods Authors: Pinar G. Balikcioglu, Melih Sirlanci, Ozge A. Kucuk, Bulut Ulukapi, Ramazan K. Turkmen, Cengiz Acarturk | Published: 2023-12-02 LSTM Model Performance EvaluationWatermarkingMalware Classification 2023.12.02 2025.05.28 Literature Database
Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05 WatermarkingMachine UnlearningWatermark Evaluation 2023.12.01 2025.05.28 Literature Database
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features Authors: Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang | Published: 2023-12-01 | Updated: 2025-03-21 URL analysis techniquesWatermarkingMalicious Website Detection 2023.12.01 2025.05.28 Literature Database
MalDicom: A Memory Forensic Framework for Detecting Malicious Payload in DICOM Files Authors: Ayushi Mishra, Priyanka Bagade | Published: 2023-12-01 | Updated: 2023-12-08 WatermarkingMalware ClassificationWatermarking Settings for Medical Data 2023.12.01 2025.05.28 Literature Database
Fool the Hydra: Adversarial Attacks against Multi-view Object Detection Systems Authors: Bilel Tarchoun, Quazi Mishkatul Alam, Nael Abu-Ghazaleh, Ihsen Alouani | Published: 2023-11-30 WatermarkingRobustness EvaluationAdversarial attack 2023.11.30 2025.05.28 Literature Database
Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29 WatermarkingCryptographyCryptography 2023.11.29 2025.05.28 Literature Database
De-identification of clinical free text using natural language processing: A systematic review of current approaches Authors: Aleksandar Kovačević, Bojana Bašaragin, Nikola Milošević, Goran Nenadić | Published: 2023-11-28 WatermarkingData ObfuscationWatermarking Settings for Medical Data 2023.11.28 2025.05.28 Literature Database