Extending Network Intrusion Detection with Enhanced Particle Swarm Optimization Techniques Authors: Surasit Songma, Watcharakorn Netharn, Siriluck Lorpunmanee | Published: 2024-08-14 CybersecurityData PreprocessingModel Performance Evaluation 2024.08.14 2025.05.27 Literature Database
Privacy in Federated Learning Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12 Privacy ProtectionPrivacy Protection MethodModel Performance Evaluation 2024.08.12 2025.05.27 Literature Database
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12 Prompt InjectionModel Performance EvaluationLog Analysis Method 2024.08.12 2025.05.27 Literature Database
MPC-Minimized Secure LLM Inference Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07 LLM Performance EvaluationMPC AlgorithmModel Performance Evaluation 2024.08.07 2025.05.27 Literature Database
Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06 Phishing DetectionModel Performance EvaluationDefense Method 2024.08.06 2025.05.27 Literature Database
Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.08.06 2025.05.27 Literature Database
From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.08.05 2025.05.27 Literature Database
PromptSAM+: Malware Detection based on Prompt Segment Anything Model Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04 WatermarkingMalware ClassificationModel Performance Evaluation 2024.08.04 2025.05.27 Literature Database
Assessing Robustness of Machine Learning Models using Covariate Perturbations Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02 Perturbation Method for Categorical VariablesModel Performance EvaluationStability of Predictions 2024.08.02 2025.05.27 Literature Database
Verification of Machine Unlearning is Fragile Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01 AlgorithmModel Performance EvaluationComputational Efficiency 2024.08.01 2025.05.27 Literature Database