Evaluating Membership Inference Attacks in heterogeneous-data setups Authors: Bram van Dartel, Marc Damie, Florian Hahn | Published: 2025-02-26 | Updated: 2025-04-28 Dataset GenerationPrivacy ProtectionAttack Type 2025.02.26 2025.05.27 Literature Database
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 CybersecurityDataset GenerationNetwork Threat Detection 2025.01.13 2025.05.27 Literature Database
Diffuse or Confuse: A Diffusion Deepfake Speech Dataset Authors: Anton Firc, Kamil Malinka, Petr Hanáček | Published: 2024-10-09 Dataset GenerationModel Performance EvaluationSpeech Synthesis Technology 2024.10.09 2025.05.27 Literature Database
Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments Authors: Maria Rigaki, Carlos Catania, Sebastian Garcia | Published: 2024-09-17 Dataset GenerationFrameworkModel Performance Evaluation 2024.09.17 2025.05.27 Literature Database
CaBaGe: Data-Free Model Extraction using ClAss BAlanced Generator Ensemble Authors: Jonathan Rosenthal, Shanchao Liang, Kevin Zhang, Lin Tan | Published: 2024-09-16 Dataset GenerationTraining Data Extraction MethodModel Extraction Attack 2024.09.16 2025.05.27 Literature Database
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification Authors: Abdelkader El Mahdaouy, Salima Lamsiyah, Meryem Janati Idrissi, Hamza Alami, Zakaria Yartaoui, Ismail Berrada | Published: 2024-09-13 Dataset GenerationMalware ClassificationModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
Advancing Malicious Website Identification: A Machine Learning Approach Using Granular Feature Analysis Authors: Kinh Tran, Dusan Sovilj | Published: 2024-09-11 Dataset GenerationModel Performance EvaluationMalicious Website Detection 2024.09.11 2025.05.27 Literature Database
Revisiting Static Feature-Based Android Malware Detection Authors: Md Tanvirul Alam, Dipkamal Bhusal, Nidhi Rastogi | Published: 2024-09-11 Dataset GenerationPoisoningModel Performance Evaluation 2024.09.11 2025.05.27 Literature Database
KGV: Integrating Large Language Models with Knowledge Graphs for Cyber Threat Intelligence Credibility Assessment Authors: Zongzong Wu, Fengxiao Tang, Ming Zhao, Yufeng Li | Published: 2024-08-15 CybersecurityDataset GenerationEvaluation Method 2024.08.15 2025.05.27 Literature Database
SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14 WatermarkingDataset GenerationSafety Alignment 2024.08.14 2025.05.27 Literature Database