Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models Authors: Florent Guépin, Nataša Krčo, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2024-05-24 Membership InferenceEvaluation Method 2024.05.24 2025.05.27 Literature Database
Towards Certification of Uncertainty Calibration under Adversarial Attacks Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22 Evaluation MethodWatermark EvaluationDifficulty Calibration 2024.05.22 2025.05.27 Literature Database
Geometry-Aware Instrumental Variable Regression Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19 WatermarkingOptimization ProblemEvaluation Method 2024.05.19 2025.05.27 Literature Database
A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15 Model Performance EvaluationAnomaly Detection MethodEvaluation Method 2024.05.18 2025.05.27 Literature Database
Fully Exploiting Every Real Sample: SuperPixel Sample Gradient Model Stealing Authors: Yunlong Zhao, Xiaoheng Deng, Yijing Liu, Xinjun Pei, Jiazhi Xia, Wei Chen | Published: 2024-05-18 Model Performance EvaluationEvaluation MethodWatermark Evaluation 2024.05.18 2025.05.27 Literature Database
A Flow is a Stream of Packets: A Stream-Structured Data Approach for DDoS Detection Authors: Raja Giryes, Lior Shafir, Avishai Wool | Published: 2024-05-12 DDoS Attack DetectionData PreprocessingEvaluation Method 2024.05.12 2025.05.27 Literature Database
AttacKG+:Boosting Attack Knowledge Graph Construction with Large Language Models Authors: Yongheng Zhang, Tingwen Du, Yunshan Ma, Xiang Wang, Yi Xie, Guozheng Yang, Yuliang Lu, Ee-Chien Chang | Published: 2024-05-08 CybersecurityThreat modelingEvaluation Method 2024.05.08 2025.05.27 Literature Database
Explainable Malware Detection with Tailored Logic Explained Networks Authors: Peter Anthony, Francesco Giannini, Michelangelo Diligenti, Martin Homola, Marco Gori, Stefan Balogh, Jan Mojzis | Published: 2024-05-05 Malware ClassificationModel InterpretabilityEvaluation Method 2024.05.05 2025.05.27 Literature Database
Chain of trust: Unraveling references among Common Criteria certified products Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19 Dependency Risk AssessmentEvaluation MethodWatermark Evaluation 2024.04.22 2025.05.27 Literature Database
JailbreakLens: Visual Analysis of Jailbreak Attacks Against Large Language Models Authors: Yingchaojie Feng, Zhizhang Chen, Zhining Kang, Sijia Wang, Minfeng Zhu, Wei Zhang, Wei Chen | Published: 2024-04-12 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.04.12 2025.05.27 Literature Database