Teacher Model Fingerprinting Attacks Against Transfer Learning Authors: Yufei Chen, Chao Shen, Cong Wang, Yang Zhang | Published: 2021-06-23 | Updated: 2022-06-23 WatermarkingData CollectionPrompt Injection 2021.06.23 2025.05.28 Literature Database
Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20 WatermarkingData Origins and EvolutionPoisoning 2021.05.20 2025.05.28 Literature Database
Simple Transparent Adversarial Examples Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20 WatermarkingAdversarial attackVulnerability Attack Method 2021.05.20 2025.05.28 Literature Database
Balboa: Bobbing and Weaving around Network Censorship Authors: Marc B. Rosen, James Parker, Alex J. Malozemoff | Published: 2021-04-13 WatermarkingCommunication AnalysisSpeech Synthesis Technology 2021.04.13 2025.05.28 Literature Database
MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05 WatermarkingMulti-Class ClassificationDeep Learning Technology 2021.03.05 2025.05.28 Literature Database
A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11 WatermarkingModel Performance EvaluationSignal Analysis 2021.02.21 2025.05.28 Literature Database
A flow-based IDS using Machine Learning in eBPF Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04 ML-Based IDSWatermarkingAttack Method 2021.02.19 2025.05.28 Literature Database
ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15 WatermarkingData Protection MethodModel Performance Evaluation 2021.02.17 2025.05.28 Literature Database
SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29 WatermarkingMalware Detection MethodHierarchical Classification Methods 2021.02.16 2025.05.28 Literature Database
Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03 WatermarkingData-Driven Vulnerability AssessmentTrust Evaluation Module 2021.02.15 2025.05.28 Literature Database