Detecting Android Malware: From Neural Embeddings to Hands-On Validation with BERTroid Authors: Meryam Chaieb, Mostafa Anouar Ghorab, Mohamed Aymen Saied | Published: 2024-05-06 | Updated: 2024-08-12 Security AnalysisMalware ClassificationModel Performance Evaluation 2024.05.06 2025.05.27 Literature Database
Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks Authors: Yi Li, Renyou Xie, Chaojie Li, Yi Wang, Zhaoyang Dong | Published: 2024-04-30 WatermarkingModel Performance EvaluationPersonalization Method 2024.04.30 2025.05.27 Literature Database
Exploring the Robustness of In-Context Learning with Noisy Labels Authors: Chen Cheng, Xinzhi Yu, Haodong Wen, Jingsong Sun, Guanzhang Yue, Yihao Zhang, Zeming Wei | Published: 2024-04-28 | Updated: 2024-05-01 Model Performance EvaluationWorkshop SurveyConvergence Analysis 2024.04.28 2025.05.27 Literature Database
LMEraser: Large Model Unlearning through Adaptive Prompt Tuning Authors: Jie Xu, Zihan Wu, Cong Wang, Xiaohua Jia | Published: 2024-04-17 Clustering methodsPrivacy Protection MethodModel Performance Evaluation 2024.04.17 2025.05.27 Literature Database
Optimization of Lightweight Malware Detection Models For AIoT Devices Authors: Felicia Lo, Shin-Ming Cheng, Rafael Kaliski | Published: 2024-04-06 Membership InferenceModel Performance EvaluationResource optimization 2024.04.06 2025.05.27 Literature Database
Evaluating Adversarial Robustness: A Comparison Of FGSM, Carlini-Wagner Attacks, And The Role of Distillation as Defense Mechanism Authors: Trilokesh Ranjan Sarkar, Nilanjan Das, Pralay Sankar Maitra, Bijoy Some, Ritwik Saha, Orijita Adhikary, Bishal Bose, Jaydip Sen | Published: 2024-04-05 WatermarkingModel Performance EvaluationAdversarial Example 2024.04.05 2025.05.27 Literature Database
Reliable Feature Selection for Adversarially Robust Cyber-Attack Detection Authors: João Vitorino, Miguel Silva, Eva Maia, Isabel Praça | Published: 2024-04-05 Model Performance EvaluationTime-Related FeaturesFeature Selection Method 2024.04.05 2025.05.27 Literature Database
Accurate Low-Degree Polynomial Approximation of Non-polynomial Operators for Fast Private Inference in Homomorphic Encryption Authors: Jianming Tong, Jingtian Dang, Anupam Golder, Callie Hao, Arijit Raychowdhury, Tushar Krishna | Published: 2024-04-04 | Updated: 2024-05-07 WatermarkingModel Performance EvaluationComputational Efficiency 2024.04.04 2025.05.27 Literature Database
Goldfish: An Efficient Federated Unlearning Framework Authors: Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo | Published: 2024-04-04 | Updated: 2024-04-23 Model Performance EvaluationLoss FunctionFederated Learning 2024.04.04 2025.05.27 Literature Database
Can Biases in ImageNet Models Explain Generalization? Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01 BiasModel Performance EvaluationWatermark Evaluation 2024.04.01 2025.05.27 Literature Database