Breaking Semantic-Aware Watermarks via LLM-Guided Coherence-Preserving Semantic Injection Authors: Zheng Gao, Xiaoyu Li, Zhicheng Bao, Xiaoyan Feng, Jiaojiao Jiang | Published: 2026-02-25 WatermarkingText Generation MethodMachine Learning Technology 2026.02.25 2026.02.27 Literature Database
Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19 Secure Arithmetic ComputationMachine Learning TechnologyWatermark 2026.02.19 2026.02.21 Literature Database
IoT Device Identification with Machine Learning: Common Pitfalls and Best Practices Authors: Kahraman Kostas, Rabia Yasa Kostas | Published: 2026-01-28 IoT Device IdentificationData Protection MethodMachine Learning Technology 2026.01.28 2026.01.30 Literature Database
Decision-Aware Trust Signal Alignment for SOC Alert Triage Authors: Israt Jahan Chowdhury, Md Abu Yousuf Tanvir | Published: 2026-01-08 コスト感度閾値信号処理技術Machine Learning Technology 2026.01.08 2026.01.10 Literature Database
Enhanced Web Payload Classification Using WAMM: An AI-Based Framework for Dataset Refinement and Model Evaluation Authors: Heba Osama, Omar Elebiary, Youssef Qassim, Mohamed Amgad, Ahmed Maghawry, Ahmed Saafan, Haitham Ghalwash | Published: 2025-12-29 SQL Injection Attack DetectionData PreprocessingMachine Learning Technology 2025.12.29 2025.12.31 Literature Database
Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12 Reliability AssessmentMachine Learning TechnologyAnomaly Detection Method 2025.05.12 2025.05.28 Literature Database
Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption Authors: Jordan Frery, Roman Bredehoft, Jakub Klemsa, Arthur Meyre, Andrei Stoian | Published: 2025-05-12 LLM SecurityCryptographyMachine Learning Technology 2025.05.12 2025.05.28 Literature Database
FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08 Privacy Design PrinciplesModel DesignMachine Learning Technology 2025.05.08 2025.05.27 Literature Database
Adversarial Sample Generation for Anomaly Detection in Industrial Control Systems Authors: Abdul Mustafa, Muhammad Talha Khan, Muhammad Azmi Umer, Zaki Masood, Chuadhry Mujeeb Ahmed | Published: 2025-05-06 Attack TypeAdversarial ExampleMachine Learning Technology 2025.05.06 2025.05.27 Literature Database
Acoustic Side-Channel Attacks on a Computer Mouse Authors: Mauro Conti, Marin Duroyon, Gabriele Orazi, Gene Tsudik | Published: 2025-05-05 Changes in User BehaviorMachine Learning TechnologySpeech Recognition System 2025.05.05 2025.05.27 Literature Database