Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM Performance EvaluationTraining MethodPrompt leaking 2025.04.23 2025.05.27 Literature Database
Protecting the integrity of the training procedure of neural networks Authors: Christian Berghoff | Published: 2020-05-14 Data DependencyTraining MethodMachine Learning Algorithm 2020.05.14 2025.05.28 Literature Database
High Accuracy Phishing Detection Based on Convolutional Neural Networks Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08 URL-based DetectionTraining MethodMachine Learning Technology 2020.04.08 2025.05.28 Literature Database
DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08 Training MethodPrivacy Protection MethodUser Activity Analysis 2020.03.23 2025.05.28 Literature Database
One Neuron to Fool Them All Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09 Training MethodRobustnessAdversarial Example 2020.03.20 2025.05.28 Literature Database
Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14 Training MethodHyperparameter OptimizationRobustness 2020.03.19 2025.05.28 Literature Database
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19 Error Correction CodeTraining MethodPrivacy Protection Method 2020.03.18 2025.05.28 Literature Database
Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26 Training MethodState Transition ModelVulnerability Attack Method 2020.03.17 2025.05.28 Literature Database
Manifold Regularization for Locally Stable Deep Neural Networks Authors: Charles Jin, Martin Rinard | Published: 2020-03-09 | Updated: 2020-09-22 Training MethodRobustnessAdversarial Example 2020.03.09 2025.05.28 Literature Database
Towards Probabilistic Verification of Machine Unlearning Authors: David Marco Sommer, Liwei Song, Sameer Wagh, Prateek Mittal | Published: 2020-03-09 | Updated: 2020-12-01 Training MethodBackdoor AttackBackdoor Attack Mitigation 2020.03.09 2025.05.28 Literature Database