ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models Authors: Shivansh Chopra, Hussain Ahmad, Diksha Goel, Claudia Szabo | Published: 2024-12-06 | Updated: 2025-05-20 Text Generation MethodPrompt InjectionComputational Efficiency 2024.12.06 2025.05.28 Literature Database
Verification of Machine Unlearning is Fragile Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01 AlgorithmModel Performance EvaluationComputational Efficiency 2024.08.01 2025.05.27 Literature Database
A Hybrid Federated Kernel Regularized Least Squares Algorithm Authors: Celeste Damiani, Yulia Rodina, Sergio Decherchi | Published: 2024-07-24 AlgorithmWatermarkingComputational Efficiency 2024.07.24 2025.05.27 Literature Database
Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 Privacy ProtectionPrivacy Protection MethodComputational Efficiency 2024.07.02 2025.05.27 Literature Database
Speed-up of Data Analysis with Kernel Trick in Encrypted Domain Authors: Joon Soo Yoo, Baek Kyung Song, Tae Min Ahn, Ji Won Heo, Ji Won Yoon | Published: 2024-06-14 WatermarkingComputational EfficiencyComputational Complexity 2024.06.14 2025.05.27 Literature Database
VeriSplit: Secure and Practical Offloading of Machine Learning Inferences across IoT Devices Authors: Han Zhang, Zifan Wang, Mihir Dhamankar, Matt Fredrikson, Yuvraj Agarwal | Published: 2024-06-02 | Updated: 2025-03-31 WatermarkingData Privacy AssessmentComputational Efficiency 2024.06.02 2025.05.27 Literature Database
A Simple Solution for Homomorphic Evaluation on Large Intervals Authors: John Chiang | Published: 2024-05-24 AlgorithmWatermarkingComputational Efficiency 2024.05.24 2025.05.27 Literature Database
PackVFL: Efficient HE Packing for Vertical Federated Learning Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01 Characteristics of VFLMatrix Multiplication MethodsComputational Efficiency 2024.05.01 2025.05.27 Literature Database
zkLLM: Zero Knowledge Proofs for Large Language Models Authors: Haochen Sun, Jason Li, Hongyang Zhang | Published: 2024-04-24 Prompt InjectionComputational EfficiencyWatermark Robustness 2024.04.24 2025.05.27 Literature Database
Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13 FPGAResource optimizationComputational Efficiency 2024.04.13 2025.05.27 Literature Database