SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18 Dynamic Threshold CalculationAdversarial ExampleEvaluation Method 2024.03.18 2025.05.27 Literature Database
An Extensive Comparison of Static Application Security Testing Tools Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14 Toolkit ComparisonVulnerability ManagementEvaluation Method 2024.03.14 2025.05.27 Literature Database
CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation Authors: Jueon Eom, Seyeon Jeong, Taekyoung Kwon | Published: 2024-02-19 FuzzingReinforcement LearningEvaluation Method 2024.02.19 2025.05.27 Literature Database
Maatphor: Automated Variant Analysis for Prompt Injection Attacks Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12 LLM SecurityPrompt InjectionEvaluation Method 2023.12.12 2025.05.27 Literature Database
Automated discovery of trade-off between utility, privacy and fairness in machine learning models Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27 Trade-off AnalysisPrivacy Protection MethodEvaluation Method 2023.11.27 2025.05.28 Literature Database
DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release Authors: Jie Fu, Qingqing Ye, Haibo Hu, Zhili Chen, Lulu Wang, Kuncan Wang, Xun Ran | Published: 2023-11-23 | Updated: 2023-11-29 Privacy ProtectionOptimization MethodsEvaluation Method 2023.11.23 2025.05.28 Literature Database
How Far Have We Gone in Vulnerability Detection Using Large Language Models Authors: Zeyu Gao, Hao Wang, Yuchen Zhou, Wenyu Zhu, Chao Zhang | Published: 2023-11-21 | Updated: 2023-12-22 Code Change AnalysisVulnerability detectionEvaluation Method 2023.11.21 2025.05.28 Literature Database
From Principle to Practice: Vertical Data Minimization for Machine Learning Authors: Robin Staab, Nikola Jovanović, Mislav Balunović, Martin Vechev | Published: 2023-11-17 | Updated: 2023-11-22 Data Management SystemPrivacy ProtectionEvaluation Method 2023.11.17 2025.05.28 Literature Database
FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17 Model ArchitectureAttack MethodEvaluation Method 2023.11.17 2025.05.28 Literature Database
DEMASQ: Unmasking the ChatGPT Wordsmith Authors: Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi | Published: 2023-11-08 Energy-Based ModelPrompt InjectionEvaluation Method 2023.11.08 2025.05.28 Literature Database