Optimized Deep Learning Models for Malware Detection under Concept Drift Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01 Performance EvaluationOptimization MethodsDeep Learning Method 2023.08.21 2025.05.28 Literature Database
A Modular and Adaptive System for Business Email Compromise Detection Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21 Business Email CompromisePhishing DetectionPerformance Evaluation 2023.08.21 2025.05.28 Literature Database
PentestGPT: An LLM-empowered Automatic Penetration Testing Tool Authors: Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-13 | Updated: 2024-06-02 Prompt InjectionPenetration Testing MethodsPerformance Evaluation 2023.08.13 2025.05.28 Literature Database
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique | Published: 2023-08-10 | Updated: 2023-10-12 WatermarkingModel Design and AccuracyPerformance Evaluation 2023.08.10 2025.05.28 Literature Database
Random-Set Neural Networks (RS-NN) Authors: Shireen Kudukkil Manchingal, Muhammad Mubashar, Kaizheng Wang, Keivan Shariatmadar, Fabio Cuzzolin | Published: 2023-07-11 | Updated: 2025-02-14 Quantification of UncertaintyPerformance EvaluationLoss Function 2023.07.11 2025.05.28 Literature Database
ConFL: Constraint-guided Fuzzing for Machine Learning Framework Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11 Algorithm DesignFuzzingPerformance Evaluation 2023.07.11 2025.05.28 Literature Database
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
When Vision Fails: Text Attacks Against ViT and OCR Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12 Performance EvaluationAttack Pattern ExtractionWatermark Robustness 2023.06.12 2025.05.28 Literature Database
Augmenting Greybox Fuzzing with Generative AI Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11 FuzzingPrompt InjectionPerformance Evaluation 2023.06.11 2025.05.28 Literature Database