DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16 AlgorithmAdversarial TrainingWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
ACW: Enhancing Traceability of AI-Generated Codes Based on Watermarking Authors: Boquan Li, Mengdi Zhang, Peixin Zhang, Jun Sun, Xingmei Wang, Zirui Fu | Published: 2024-02-12 | Updated: 2024-08-21 AlgorithmWatermarkingWatermark Evaluation 2024.02.12 2025.05.27 Literature Database
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Dynamic Incremental Optimization for Best Subset Selection Authors: Shaogang Ren, Xiaoning Qian | Published: 2024-02-04 | Updated: 2024-12-30 AlgorithmSparse ModelOptimization Methods 2024.02.04 2025.05.27 Literature Database
algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01 AlgorithmWebsite VulnerabilityCybersecurity 2024.02.01 2025.05.27 Literature Database
Unlearnable Algorithms for In-context Learning Authors: Andrei Muresanu, Anvith Thudi, Michael R. Zhang, Nicolas Papernot | Published: 2024-02-01 Few-Shot LearningAlgorithmMachine Unlearning 2024.02.01 2025.05.27 Literature Database
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 AlgorithmWatermarkingCyber Attack 2024.01.27 2025.05.27 Literature Database
Training Differentially Private Ad Prediction Models with Semi-Sensitive Features Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26 AlgorithmWatermarkingPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database
Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16 DoS MitigationAlgorithmMalicious Node Detection 2024.01.16 2025.05.27 Literature Database