Performance Evaluation

Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection

Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06
Dataset Generation
Performance Evaluation
Vulnerability Management

An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices

Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23
Performance Evaluation
Threat modeling
Federated Learning

When Vision Fails: Text Attacks Against ViT and OCR

Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12
Performance Evaluation
Attack Pattern Extraction
Watermark Robustness

Augmenting Greybox Fuzzing with Generative AI

Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11
Fuzzing
Prompt Injection
Performance Evaluation

Efficient Skip Connections Realization for Secure Inference on Encrypted Data

Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11
Privacy Technique
Real-Time Inference
Performance Evaluation

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
Security Analysis
Performance Evaluation
Machine Learning Technology

Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27
Client Clustering
Clustering methods
Performance Evaluation

MGTBench: Benchmarking Machine-Generated Text Detection

Authors: Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang | Published: 2023-03-26 | Updated: 2024-01-16
MGT Detection Method
Prompt Injection
Performance Evaluation

In-Context Retrieval-Augmented Language Models

Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01
RAG
Data Generation Method
Performance Evaluation

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03
Backdoor Attack
Poisoning
Performance Evaluation