Can Go AIs be adversarially robust? Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14 Model Performance EvaluationAttack MethodWatermark Evaluation 2024.06.18 2025.05.27 Literature Database
Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou | Published: 2024-06-16 Privacy Protection MethodMembership InferenceModel Performance Evaluation 2024.06.16 2025.05.27 Literature Database
Malicious URL Detection using optimized Hist Gradient Boosting Classifier based on grid search method Authors: Mohammad Maftoun, Nima Shadkam, Seyedeh Somayeh Salehi Komamardakhi, Zulkefli Mansor, Javad Hassannataj Joloudari | Published: 2024-06-12 Model Performance EvaluationMalicious Website DetectionMachine Learning Method 2024.06.12 2025.05.27 Literature Database
Efficient Network Traffic Feature Sets for IoT Intrusion Detection Authors: Miguel Silva, João Vitorino, Eva Maia, Isabel Praça | Published: 2024-06-12 Prompt InjectionModel Performance EvaluationMachine Learning Method 2024.06.12 2025.05.27 Literature Database
VulDetectBench: Evaluating the Deep Capability of Vulnerability Detection with Large Language Models Authors: Yu Liu, Lang Gao, Mingxin Yang, Yu Xie, Ping Chen, Xiaojin Zhang, Wei Chen | Published: 2024-06-11 | Updated: 2024-08-21 LLM Performance EvaluationModel Performance EvaluationVulnerability Management 2024.06.11 2025.05.27 Literature Database
Concept Drift Detection using Ensemble of Integrally Private Models Authors: Ayush K. Varshney, Vicenc Torra | Published: 2024-06-07 Data Privacy AssessmentPrivacy Protection MethodModel Performance Evaluation 2024.06.07 2025.05.27 Literature Database
Nonlinear Transformations Against Unlearnable Datasets Authors: Thushari Hapuarachchi, Jing Lin, Kaiqi Xiong, Mohamed Rahouti, Gitte Ost | Published: 2024-06-05 Data Protection MethodModel Performance EvaluationAdversarial Example 2024.06.05 2025.05.27 Literature Database
Decoupled Alignment for Robust Plug-and-Play Adaptation Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
Differentially Private Tabular Data Synthesis using Large Language Models Authors: Toan V. Tran, Li Xiong | Published: 2024-06-03 Dataset GenerationPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation Authors: Hanlin Gu, Jiahuan Luo, Yan Kang, Yuan Yao, Gongxi Zhu, Bowen Li, Lixin Fan, Qiang Yang | Published: 2024-06-03 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database