Goldfish: An Efficient Federated Unlearning Framework Authors: Houzhe Wang, Xiaojie Zhu, Chi Chen, Paulo Esteves-Veríssimo | Published: 2024-04-04 | Updated: 2024-04-23 Model Performance EvaluationLoss FunctionFederated Learning 2024.04.04 2025.05.27 Literature Database
Can Biases in ImageNet Models Explain Generalization? Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01 BiasModel Performance EvaluationWatermark Evaluation 2024.04.01 2025.05.27 Literature Database
Machine Unlearning for Traditional Models and Large Language Models: A Short Survey Authors: Yi Xu | Published: 2024-04-01 Data Privacy AssessmentModel Performance EvaluationMachine Unlearning 2024.04.01 2025.05.27 Literature Database
Enhancing Reasoning Capacity of SLM using Cognitive Enhancement Authors: Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan | Published: 2024-04-01 LLM Performance EvaluationModel Performance EvaluationLog Analysis Method 2024.04.01 2025.05.27 Literature Database
Can ChatGPT Detect DeepFakes? A Study of Using Multimodal Large Language Models for Media Forensics Authors: Shan Jia, Reilin Lyu, Kangran Zhao, Yize Chen, Zhiyuan Yan, Yan Ju, Chuanbo Hu, Xin Li, Baoyuan Wu, Siwei Lyu | Published: 2024-03-21 | Updated: 2024-06-11 LLM Performance EvaluationModel Performance EvaluationWatermark Evaluation 2024.03.21 2025.05.27 Literature Database
Thwarting Cybersecurity Attacks with Explainable Concept Drift Authors: Ibrahim Shaer, Abdallah Shami | Published: 2024-03-18 CybersecurityModel Performance EvaluationConcept Drift 2024.03.18 2025.05.27 Literature Database
Hierarchical Classification for Intrusion Detection System: Effective Design and Empirical Analysis Authors: Md. Ashraf Uddin, Sunil Aryal, Mohamed Reda Bouadjenek, Muna Al-Hawawreh, Md. Alamin Talukder | Published: 2024-03-17 Training Data Extraction MethodModel Performance EvaluationHierarchical Classification Methods 2024.03.17 2025.05.27 Literature Database
A Sophisticated Framework for the Accurate Detection of Phishing Websites Authors: Asif Newaz, Farhan Shahriyar Haq, Nadim Ahmed | Published: 2024-03-13 Phishing DetectionFrameworkModel Performance Evaluation 2024.03.13 2025.05.27 Literature Database
SoK: Reducing the Vulnerability of Fine-tuned Language Models to Membership Inference Attacks Authors: Guy Amit, Abigail Goldsteen, Ariel Farkash | Published: 2024-03-13 Privacy Protection MethodMembership InferenceModel Performance Evaluation 2024.03.13 2025.05.27 Literature Database
DNNShield: Embedding Identifiers for Deep Neural Network Ownership Verification Authors: Jasper Stang, Torsten Krauß, Alexandra Dmitrienko | Published: 2024-03-11 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2024.03.11 2025.05.27 Literature Database