evaluation metrics

Deceptive Fairness Attacks on Graphs via Meta Learning

Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24
Graph Neural Network
Attack Method
evaluation metrics

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15
Data Generation
Privacy Protection Method
evaluation metrics

AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation

Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04
Data Generation
Threat modeling
evaluation metrics

Jailbreaker in Jail: Moving Target Defense for Large Language Models

Authors: Bocheng Chen, Advait Paliwal, Qiben Yan | Published: 2023-10-03
LLM Performance Evaluation
Prompt Injection
evaluation metrics

Beyond Labeling Oracles: What does it mean to steal ML models?

Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13
Data Collection
Knowledge Extraction Method
evaluation metrics

Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement

Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23
Data Generation
Privacy Technique
evaluation metrics

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC Analysis Method
Data Collection
evaluation metrics

An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph

Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17
Experimental Validation
Vulnerability detection
evaluation metrics

Attack vs Benign Network Intrusion Traffic Classification

Authors: M. Andrecut | Published: 2022-05-15
Performance Evaluation
Attack Detection
evaluation metrics

Finding MNEMON: Reviving Memories of Node Embeddings

Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29
Algorithm Design
Dataset evaluation
evaluation metrics