QuMoS: A Framework for Preserving Security of Quantum Machine Learning Model Authors: Zhepeng Wang, Jinyang Li, Zhirui Hu, Blake Gage, Elizabeth Iwasawa, Weiwen Jiang | Published: 2023-04-23 | Updated: 2023-10-13 Security AnalysisOptimization MethodsQuantization and Privacy 2023.04.23 2025.05.28 Literature Database
How Secure is Code Generated by ChatGPT? Authors: Raphaël Khoury, Anderson R. Avila, Jacob Brunelle, Baba Mamadou Camara | Published: 2023-04-19 Security AnalysisProgram VerificationVulnerability Prediction 2023.04.19 2025.05.28 Literature Database
AI Product Security: A Primer for Developers Authors: Ebenezer R. H. P. Isaac, Jim Reno | Published: 2023-04-18 Security AnalysisPrivacy TechniqueCompliance with Ethical Guidelines 2023.04.18 2025.05.28 Literature Database
Crossing Roads of Federated Learning and Smart Grids: Overview, Challenges, and Perspectives Authors: Hafsa Bousbiat, Roumaysa Bousselidj, Yassine Himeur, Abbes Amira, Faycal Bensaali, Fodil Fadli, Wathiq Mansoor, Wilfried Elmenreich | Published: 2023-04-17 Energy-Based ModelSecurity AnalysisPrivacy Technique 2023.04.17 2025.05.28 Literature Database
Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13 Security AnalysisDataset GenerationNatural Language Processing 2023.04.13 2025.05.28 Literature Database
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 WatermarkingSecurity AnalysisPrivacy Technique 2023.04.12 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 Security AnalysisThreat modelingVulnerability Mitigation Technique 2023.04.05 2025.05.28 Literature Database
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 Security AnalysisNetwork Threat DetectionEducational CTF 2023.04.03 2025.05.28 Literature Database
Graph Mining for Cybersecurity: A Survey Authors: Bo Yan, Cheng Yang, Chuan Shi, Yong Fang, Qi Li, Yanfang Ye, Junping Du | Published: 2023-04-02 | Updated: 2023-10-16 Graph EmbeddingGraph ConstructionSecurity Analysis 2023.04.02 2025.05.28 Literature Database