Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 Deep Learning MethodThreat modelingVulnerability Analysis 2023.06.01 2025.05.28 Literature Database
Frequency maps reveal the correlation between Adversarial Attacks and Implicit Bias Authors: Lorenzo Basile, Nikos Karantzas, Alberto d'Onofrio, Luca Manzoni, Luca Bortolussi, Alex Rodriguez, Fabio Anselmi | Published: 2023-05-24 | Updated: 2025-04-08 Adversarial ExampleAdversarial attackDeep Learning Method 2023.05.24 2025.05.28 Literature Database
Expressive Losses for Verified Robustness via Convex Combinations Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18 Parameter TuningMachine Learning MethodDeep Learning Method 2023.05.23 2025.05.28 Literature Database
Can deepfakes be created by novice users? Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28 Analysis of Detection MethodsDeep Learning MethodChallenges of Generative Models 2023.04.28 2025.05.28 Literature Database
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks Authors: Mahnoor Shahid | Published: 2023-04-27 Analysis of Detection MethodsMachine Learning MethodDeep Learning Method 2023.04.27 2025.05.28 Literature Database
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23 Identification of AI OutputText Perturbation MethodDeep Learning Method 2023.01.26 2025.05.28 Literature Database
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.21 2025.05.28 Literature Database
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.18 2025.05.28 Literature Database
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling Authors: Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang | Published: 2022-10-18 | Updated: 2024-08-01 Privacy AnalysisPrivacy AssessmentDeep Learning Method 2022.10.18 2025.05.28 Literature Database