How Effective Can Dropout Be in Multiple Instance Learning ? Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 | Updated: 2025-05-20 Performance EvaluationMulti-Class ClassificationWatermarking Technology 2025.04.21 2025.05.27 Literature Database
Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 Performance EvaluationPrivacy Protection MethodDistributed Learning 2025.03.10 2025.05.27 Literature Database
Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16 CybersecurityPerformance Evaluationevaluation metrics 2025.03.06 2025.06.18 Literature Database
Towards Action Hijacking of Large Language Model-based Agent Authors: Yuyang Zhang, Kangjie Chen, Jiaxin Gao, Ronghao Cui, Run Wang, Lina Wang, Tianwei Zhang | Published: 2024-12-14 | Updated: 2025-06-12 Performance EvaluationPrompt leakingLarge Language Model 2024.12.14 2025.06.14 Literature Database
Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods Authors: Joseph Pollock, Igor Shilov, Euodia Dodd, Yves-Alexandre de Montjoye | Published: 2024-11-08 | Updated: 2025-06-12 Performance EvaluationMembership InferenceDifferential Privacy 2024.11.08 2025.06.14 Literature Database
“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11 Algorithm DesignPerformance EvaluationPrivacy Protection Mechanism 2022.06.24 2025.05.28 Literature Database
Darknet Traffic Classification and Adversarial Attacks Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12 Performance EvaluationAdversarial Attack MethodsDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 Cyber ThreatSpam DetectionPerformance Evaluation 2022.06.06 2025.05.28 Literature Database
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 Performance EvaluationAttack Detectionevaluation metrics 2022.05.15 2025.05.28 Literature Database
On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13 Performance EvaluationPrivacy AssessmentModel Selection 2022.05.13 2025.05.28 Literature Database