Training Method

Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code

Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23
LLM Performance Evaluation
Training Method
Prompt leaking

Protecting the integrity of the training procedure of neural networks

Authors: Christian Berghoff | Published: 2020-05-14
Data Dependency
Training Method
Machine Learning Algorithm

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08
URL-based Detection
Training Method
Machine Learning Technology

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08
Training Method
Privacy Protection Method
User Activity Analysis

One Neuron to Fool Them All

Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09
Training Method
Robustness
Adversarial Example

Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14
Training Method
Hyperparameter Optimization
Robustness

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication

Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19
Error Correction Code
Training Method
Privacy Protection Method

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
Training Method
State Transition Model
Vulnerability Attack Method

Manifold Regularization for Locally Stable Deep Neural Networks

Authors: Charles Jin, Martin Rinard | Published: 2020-03-09 | Updated: 2020-09-22
Training Method
Robustness
Adversarial Example

Towards Probabilistic Verification of Machine Unlearning

Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01
Training Method
Backdoor Attack
Backdoor Attack Mitigation