Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05 Online LearningApplication of Text ClassificationMachine Learning Technology 2025.05.05 2025.05.27 Literature Database
Leveraging VAE-Derived Latent Spaces for Enhanced Malware Detection with Machine Learning Classifiers Authors: Bamidele Ajayi, Basel Barakat, Ken McGarry | Published: 2025-03-24 | Updated: 2025-04-30 Malware ClassificationFactors of Performance DegradationMachine Learning Technology 2025.03.24 2025.05.27 Literature Database
I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05 Application Classification MethodChanges in User BehaviorMachine Learning Technology 2025.01.25 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
In-Context Unlearning: Language Models as Few Shot Unlearners Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06 Data LeakagePerformance EvaluationMachine Learning Technology 2023.10.11 2025.05.28 Literature Database
Compact: Approximating Complex Activation Functions for Secure Computation Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian | Published: 2023-09-09 | Updated: 2024-03-17 MPC AlgorithmMulti-Party ComputationMachine Learning Technology 2023.09.09 2025.05.28 Literature Database
MONDEO: Multistage Botnet Detection Authors: Duarte Dias, Bruno Sousa, Nuno Antunes | Published: 2023-08-31 Efficiency EvaluationUnknown Attack DetectionMachine Learning Technology 2023.08.31 2025.05.28 Literature Database
Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30 Interpretation of Topic ModelsClassification of Malicious ActorsMachine Learning Technology 2023.08.30 2025.05.28 Literature Database
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18 Data CollectionModel Performance EvaluationMachine Learning Technology 2023.08.18 2025.05.28 Literature Database
Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08 Cyber AttackMachine Learning Technology 2023.08.08 2025.05.28 Literature Database