Revisit, Extend, and Enhance Hessian-Free Influence Functions Authors: Ziao Yang, Han Yue, Jian Chen, Hongfu Liu | Published: 2024-05-25 | Updated: 2024-10-20 PoisoningModel Performance EvaluationEvaluation Method 2024.05.25 2025.05.27 Literature Database
GAN-GRID: A Novel Generative Attack on Smart Grid Stability Prediction Authors: Emad Efatinasab, Alessandro Brighente, Mirco Rampazzo, Nahal Azadi, Mauro Conti | Published: 2024-05-20 Model Performance EvaluationAttack EvaluationAttack Method 2024.05.20 2025.05.27 Literature Database
Information Leakage from Embedding in Large Language Models Authors: Zhipeng Wan, Anda Cheng, Yinggui Wang, Lei Wang | Published: 2024-05-20 | Updated: 2024-05-22 LLM Performance EvaluationMembership InferenceModel Performance Evaluation 2024.05.20 2025.05.27 Literature Database
A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15 Model Performance EvaluationAnomaly Detection MethodEvaluation Method 2024.05.18 2025.05.27 Literature Database
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 Model Performance EvaluationEvaluation MethodWatermark Evaluation 2024.05.18 2025.05.27 Literature Database
DoLLM: How Large Language Models Understanding Network Flow Data to Detect Carpet Bombing DDoS Authors: Qingyang Li, Yihang Zhang, Zhidong Jia, Yannan Hu, Lei Zhang, Jianrong Zhang, Yongming Xu, Yong Cui, Zongming Guo, Xinggong Zhang | Published: 2024-05-13 DDoS Attack DetectionLLM Performance EvaluationModel Performance Evaluation 2024.05.13 2025.05.27 Literature Database
Challenging Machine Learning Algorithms in Predicting Vulnerable JavaScript Functions Authors: Rudolf Ferenc, Péter Hegedűs, Péter Gyimesi, Gábor Antal, Dénes Bán, Tibor Gyimóthy | Published: 2024-05-12 Model Performance EvaluationMachine Learning MethodVulnerability Management 2024.05.12 2025.05.27 Literature Database
LLMPot: Dynamically Configured LLM-based Honeypot for Industrial Protocol and Physical Process Emulation Authors: Christoforos Vasilatos, Dunia J. Mahboobeh, Hithem Lamri, Manaar Alam, Michail Maniatakos | Published: 2024-05-09 | Updated: 2025-05-19 ICS Honeypot DevelopmentDataset GenerationModel Performance Evaluation 2024.05.09 2025.05.27 Literature Database
Model Reconstruction Using Counterfactual Explanations: A Perspective From Polytope Theory Authors: Pasan Dissanayake, Sanghamitra Dutta | Published: 2024-05-08 | Updated: 2024-11-05 Model Performance EvaluationModel Extraction AttackWatermark Evaluation 2024.05.08 2025.05.27 Literature Database
Unlearning Backdoor Attacks through Gradient-Based Model Pruning Authors: Kealan Dunnett, Reza Arablouei, Dimity Miller, Volkan Dedeoglu, Raja Jurdak | Published: 2024-05-07 Backdoor AttackModel Performance Evaluation 2024.05.07 2025.05.27 Literature Database