Deceptive Fairness Attacks on Graphs via Meta Learning Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24 Graph Neural NetworkAttack Methodevaluation metrics 2023.10.24 2025.05.28 Literature Database
Private Synthetic Data Meets Ensemble Learning Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15 Data GenerationPrivacy Protection Methodevaluation metrics 2023.10.15 2025.05.28 Literature Database
AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04 Data GenerationThreat modelingevaluation metrics 2023.10.04 2025.05.28 Literature Database
Jailbreaker in Jail: Moving Target Defense for Large Language Models Authors: Bocheng Chen, Advait Paliwal, Qiben Yan | Published: 2023-10-03 LLM Performance EvaluationPrompt Injectionevaluation metrics 2023.10.03 2025.05.28 Literature Database
Beyond Labeling Oracles: What does it mean to steal ML models? Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13 Data CollectionKnowledge Extraction Methodevaluation metrics 2023.10.03 2025.05.28 Literature Database
Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23 Data GenerationPrivacy Techniqueevaluation metrics 2023.09.13 2025.05.28 Literature Database
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 IoC Analysis MethodData Collectionevaluation metrics 2023.06.28 2025.05.28 Literature Database
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17 Experimental ValidationVulnerability detectionevaluation metrics 2023.04.17 2025.05.28 Literature Database
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 Performance EvaluationAttack Detectionevaluation metrics 2022.05.15 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database