Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang | Published: 2025-04-16 Backdoor DetectionImprovement of LearningEffectiveness Analysis of Defense Methods 2025.04.16 2025.05.27 Literature Database
Support is All You Need for Certified VAE Training Authors: Changming Xu, Debangshu Banerjee, Deepak Vasisht, Gagandeep Singh | Published: 2025-04-16 Improvement of LearningAdversarial attackWatermark Design 2025.04.16 2025.05.27 Literature Database
On the Practice of Deep Hierarchical Ensemble Network for Ad Conversion Rate Prediction Authors: Jinfeng Zhuang, Yinrui Li, Runze Su, Ke Xu, Zhixuan Shao, Kungang Li, Ling Leng, Han Sun, Meng Qi, Yixiong Meng, Yang Tang, Zhifang Liu, Qifei Shen, Aayush Mudgal, Caleb Lu, Jie Liu, Hongda Shen | Published: 2025-04-10 | Updated: 2025-04-23 User Experience EvaluationImprovement of LearningMachine Learning Application 2025.04.10 2025.05.27 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database
LegalGuardian: A Privacy-Preserving Framework for Secure Integration of Large Language Models in Legal Practice Authors: M. Mikail Demir, Hakan T. Otal, M. Abdullah Canbaz | Published: 2025-01-19 Privacy ProtectionImprovement of LearningSafety Alignment 2025.01.19 2025.05.27 Literature Database
SpaLLM-Guard: Pairing SMS Spam Detection Using Open-source and Commercial LLMs Authors: Muhammad Salman, Muhammad Ikram, Nardine Basta, Mohamed Ali Kaafar | Published: 2025-01-09 LLM Performance EvaluationPrompt InjectionImprovement of Learning 2025.01.09 2025.05.27 Literature Database
Ensuring superior learning outcomes and data security for authorized learner Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01 Security AssuranceImprovement of Learning 2025.01.01 2025.05.27 Literature Database
Detecting Unsuccessful Students in Cybersecurity Exercises in Two Different Learning Environments Authors: Valdemar Švábenský, Kristián Tkáčik, Aubrey Birdwell, Richard Weiss, Ryan S. Baker, Pavel Čeleda, Jan Vykopal, Jens Mache, Ankur Chattopadhyay | Published: 2024-08-16 Data CollectionStudent Performance PredictionImprovement of Learning 2024.08.16 2025.05.27 Literature Database
Improving the Generation Quality of Watermarked Large Language Models via Word Importance Scoring Authors: Yuhang Li, Yihan Wang, Zhouxing Shi, Cho-Jui Hsieh | Published: 2023-11-16 Token Collection MethodImprovement of LearningDeep Learning Method 2023.11.16 2025.05.28 Literature Database
Seeing is Believing: A Federated Learning Based Prototype to Detect Wireless Injection Attacks Authors: Aadil Hussain, Nitheesh Gundapu, Sarang Drugkar, Suraj Kiran, J. Harshan, Ranjitha Prasad | Published: 2023-11-11 Improvement of LearningDeep Learning MethodDefense Method 2023.11.11 2025.05.28 Literature Database