SimProcess: High Fidelity Simulation of Noisy ICS Physical Processes Authors: Denis Donadel, Gabriele Crestanello, Giulio Morandini, Daniele Antonioli, Mauro Conti, Massimo Merro | Published: 2025-05-28 Data Origins and EvolutionModel DesignDynamic Analysis Method 2025.05.28 2025.05.30 Literature Database
FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08 Privacy Design PrinciplesModel DesignMachine Learning Technology 2025.05.08 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
Contextual Chart Generation for Cyber Deception Authors: David D. Nguyen, David Liebowitz, Surya Nepal, Salil S. Kanhere, Sharif Abuadbba | Published: 2024-04-07 Data PreprocessingModel DesignEvaluation Method 2024.04.07 2025.05.27 Literature Database
Robustness-Congruent Adversarial Training for Secure Machine Learning Model Updates Authors: Daniele Angioni, Luca Demetrio, Maura Pintor, Luca Oneto, Davide Anguita, Battista Biggio, Fabio Roli | Published: 2024-02-27 | Updated: 2025-05-29 Model DesignRobustness EvaluationAdversarial Learning 2024.02.27 2025.05.31 Literature Database
Federated Bayesian Network Ensembles Authors: Florian van Daalen, Lianne Ippel, Andre Dekker, Inigo Bermejo | Published: 2024-02-19 Bayesian ClassificationModel DesignFederated Learning 2024.02.19 2025.05.27 Literature Database
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter | Published: 2024-02-02 WatermarkingModel Design 2024.02.02 2025.05.27 Literature Database
A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Privately Aligning Language Models with Reinforcement Learning Authors: Fan Wu, Huseyin A. Inan, Arturs Backurs, Varun Chandrasekaran, Janardhan Kulkarni, Robert Sim | Published: 2023-10-25 | Updated: 2024-05-03 Privacy TechniqueModel DesignNatural Language Processing 2023.10.25 2025.05.28 Literature Database
Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos | Published: 2023-10-25 | Updated: 2024-04-15 IoT Device IdentificationFingerprinting MethodModel Design 2023.10.25 2025.05.28 Literature Database