Performance Evaluation Method

Beyond Imprecise Distance Metrics: LLM-Predicted Target Call Stacks for Directed Greybox Fuzzing

Authors: Yifan Zhang, Xin Zhang | Published: 2025-10-27
Software Security
Performance Evaluation Method
Vulnerability detection

Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection

Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12
Perturbation Method for Categorical Variables
Framework
Performance Evaluation Method

Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks

Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11
Framework
Prompt Injection
Performance Evaluation Method

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07
IoTネットワーク攻撃
Performance Evaluation Method
Watermark Design

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07
RAG
Performance Evaluation Method
Deep Learning

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07
Poisoning attack on RAG
Reinforcement Learning
Performance Evaluation Method

Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation

Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06
Robust Optimization
Performance Evaluation Method
Deep Learning

A Crowdsensing Intrusion Detection Dataset For Decentralized Federated Learning Models

Authors: Chao Feng, Alberto Huertas Celdran, Jing Han, Heqing Ren, Xi Cheng, Zien Zeng, Lucas Krauter, Gerome Bovet, Burkhard Stiller | Published: 2025-07-17
IoT Data Analysis Task
Performance Evaluation Method
Feature Extraction

Robust Anomaly Detection in Network Traffic: Evaluating Machine Learning Models on CICIDS2017

Authors: Zhaoyang Xu, Yunbo Liu | Published: 2025-06-23 | Updated: 2025-08-11
Certified Robustness
Performance Evaluation Method
Anomaly Detection Method

Sharpening Kubernetes Audit Logs with Context Awareness

Authors: Matteo Franzil, Valentino Armani, Luis Augusto Dias Knob, Domenico Siracusa | Published: 2025-06-19 | Updated: 2025-10-27
Challenges of Log Analysis
Performance Evaluation Method
監査手法