Using Large Language Models for Template Detection from Security Event Logs Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-04-14 LLM Performance EvaluationAlgorithmEvaluation Method 2024.09.08 2025.05.27 Literature Database
2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20 Backdoor AttackPoisoningEvaluation Method 2024.09.08 2025.05.27 Literature Database
MILE: A Mutation Testing Framework of In-Context Learning Systems Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07 Few-Shot LearningMutation TestingEvaluation Method 2024.09.07 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database
Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19 Adversarial ExampleEvaluation MethodWatermark Evaluation 2024.09.04 2025.05.27 Literature Database
AdvSecureNet: A Python Toolkit for Adversarial Machine Learning Authors: Melih Catal, Manuel Günther | Published: 2024-09-04 Toolkit ComparisonAdversarial TrainingEvaluation Method 2024.09.04 2025.05.27 Literature Database
DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03 Smart ContractBlockchain TechnologyEvaluation Method 2024.09.03 2025.05.27 Literature Database
Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01 PoisoningAdversarial ExampleEvaluation Method 2024.09.01 2025.05.27 Literature Database
Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23 Security AnalysisVulnerability ManagementEvaluation Method 2024.08.23 2025.05.27 Literature Database
Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05 LLM Performance EvaluationPrivacy Protection MethodEvaluation Method 2024.08.20 2025.05.27 Literature Database