Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12 Reliability AssessmentMachine Learning TechnologyAnomaly Detection Method 2025.05.12 2025.05.28 Literature Database
Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption Authors: Jordan Frery, Roman Bredehoft, Jakub Klemsa, Arthur Meyre, Andrei Stoian | Published: 2025-05-12 LLM SecurityCryptographyMachine Learning Technology 2025.05.12 2025.05.28 Literature Database
FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08 Privacy Design PrinciplesModel DesignMachine Learning Technology 2025.05.08 2025.05.27 Literature Database
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06 Attack TypeAdversarial ExampleMachine Learning Technology 2025.05.06 2025.05.27 Literature Database
Acoustic Side-Channel Attacks on a Computer Mouse Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05 Changes in User BehaviorMachine Learning TechnologySpeech Recognition System 2025.05.05 2025.05.27 Literature Database
Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05 Online LearningApplication of Text ClassificationMachine Learning Technology 2025.05.05 2025.05.27 Literature Database
Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30 Malware ClassificationFactors of Performance DegradationMachine Learning Technology 2025.03.24 2025.05.27 Literature Database
I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05 Application Classification MethodChanges in User BehaviorMachine Learning Technology 2025.01.25 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
In-Context Unlearning: Language Models as Few Shot Unlearners Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06 Data LeakagePerformance EvaluationMachine Learning Technology 2023.10.11 2025.05.28 Literature Database