Paraphrasing evades detectors of AI-generated text, but retrieval is an effective defense Authors: Kalpesh Krishna, Yixiao Song, Marzena Karpinska, John Wieting, Mohit Iyyer | Published: 2023-03-23 | Updated: 2023-10-18 DNN IP Protection MethodPrompt InjectionMachine Learning Technology 2023.03.23 2025.05.28 Literature Database
A survey on hardware-based malware detection approaches Authors: Cristiano Pegoraro Chenet, Alessandro Savino, Stefano Di Carlo | Published: 2023-03-22 | Updated: 2024-04-18 Challenges of HPCCybersecurityMachine Learning Technology 2023.03.22 2025.05.28 Literature Database
DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03 CybersecurityMembership InferenceMachine Learning Technology 2023.03.20 2025.05.28 Literature Database
Utilization of Impedance Disparity Incurred from Switching Activities to Monitor and Characterize Firmware Activities Authors: Md Sadik Awal, Christopher Thompson, Md Tauhidur Rahman | Published: 2023-01-17 Data CollectionProgram AnalysisMachine Learning Technology 2023.01.17 2025.05.28 Literature Database
A Review on the effectiveness of Dimensional Reduction with Computational Forensics: An Application on Malware Analysis Authors: Aye Thaw Da Naing, Justin Soh Beng Guan, Yarzar Shwe Win, Jonathan Pan | Published: 2023-01-15 Performance Evaluation MetricsMachine Learning TechnologyFeature Selection Method 2023.01.15 2025.05.28 Literature Database
Classification of Web Phishing Kits for early detection by platform providers Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15 Security AnalysisMalicious Website DetectionMachine Learning Technology 2022.10.15 2025.05.28 Literature Database
DI-NIDS: Domain Invariant Network Intrusion Detection System Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15 Performance EvaluationMachine Learning TechnologyDeep Learning Method 2022.10.15 2025.05.28 Literature Database
Reinforcement Learning for Hardware Security: Opportunities, Developments, and Challenges Authors: Satwik Patnaik, Vasudev Gohil, Hao Guo, Jeyavijayan, Rajendran | Published: 2022-08-29 Reward Mechanism DesignOptimization ProblemMachine Learning Technology 2022.08.29 2025.05.28 Literature Database
Lateral Movement Detection Using User Behavioral Analysis Authors: Deepak Kushwaha, Dhruv Nandakumar, Akshay Kakkar, Sanvi Gupta, Kevin Choi, Christopher Redino, Abdul Rahman, Sabthagiri Saravanan Chandramohan, Edward Bowen, Matthew Weeks, Aaron Shaha, Joe Nehila | Published: 2022-08-29 User Behavior AnalysisMachine Learning TechnologyFeature Extraction Method 2022.08.29 2025.05.28 Literature Database
Overparameterization from Computational Constraints Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15 Verification of Digital SignaturesMachine Learning TechnologyFunction Definition 2022.08.27 2025.05.28 Literature Database