LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts Authors: Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun Chen | Published: 2024-01-14 | Updated: 2025-04-02 Smart ContractCertified RobustnessModel Performance Evaluation 2024.01.14 2025.05.27 Literature Database
When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11 WatermarkingMemory Management MethodModel Performance Evaluation 2024.01.11 2025.05.27 Literature Database
Optimized Ensemble Model Towards Secured Industrial IoT Devices Authors: MohammadNoor Injadat | Published: 2024-01-10 Model Performance EvaluationIntrusion Detection SystemOptimization Methods 2024.01.10 2025.05.27 Literature Database
Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07 Class ImbalanceModel Performance EvaluationAnomaly Detection Method 2024.01.07 2025.05.27 Literature Database
MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05 Backdoor AttackMalware ClassificationModel Performance Evaluation 2024.01.05 2025.05.27 Literature Database
Facebook Report on Privacy of fNIRS data Authors: Md Imran Hossen, Sai Venkatesh Chilukoti, Liqun Shan, Vijay Srinivas Tida, Xiali Hei | Published: 2024-01-01 Privacy Protection MethodModel Performance EvaluationFederated Learning 2024.01.01 2025.05.27 Literature Database
Differentially Private Low-Rank Adaptation of Large Language Model Using Federated Learning Authors: Xiao-Yang Liu, Rongyi Zhu, Daochen Zha, Jiechao Gao, Shan Zhong, Matt White, Meikang Qiu | Published: 2023-12-29 | Updated: 2024-06-02 Privacy Protection MethodModel Performance EvaluationFederated Learning 2023.12.29 2025.05.27 Literature Database
Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27 Dataset GenerationModel Performance EvaluationLiterature List 2023.12.27 2025.05.27 Literature Database
A Learning oriented DLP System based on Classification Model Authors: Kishu Gupta, Ashwani Kush | Published: 2023-12-21 Data Protection MethodData PreprocessingModel Performance Evaluation 2023.12.21 2025.05.27 Literature Database
Towards an in-depth detection of malware using distributed QCNN Authors: Tony Quertier, Grégoire Barrué | Published: 2023-12-19 AlgorithmModel Performance EvaluationQuantum Machine Learning 2023.12.19 2025.05.27 Literature Database