Algorithm

DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation

Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16
Algorithm
Adversarial Training
Watermark Evaluation

ACW: Enhancing Traceability of AI-Generated Codes Based on Watermarking

Authors: Boquan Li, Mengdi Zhang, Peixin Zhang, Jun Sun, Xingmei Wang, Zirui Fu | Published: 2024-02-12 | Updated: 2024-08-21
Algorithm
Watermarking
Watermark Evaluation

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples

Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05
Algorithm
Algorithm Design
Dataset Generation

Dynamic Incremental Optimization for Best Subset Selection

Authors: Shaogang Ren, Xiaoning Qian | Published: 2024-02-04 | Updated: 2024-12-30
Algorithm
Sparse Model
Optimization Methods

algoXSSF: Detection and analysis of cross-site request forgery (XSRF) and cross-site scripting (XSS) attacks via Machine learning algorithms

Authors: Naresh Kshetri, Dilip Kumar, James Hutson, Navneet Kaur, Omar Faruq Osama | Published: 2024-02-01
Algorithm
Website Vulnerability
Cybersecurity

Unlearnable Algorithms for In-context Learning

Authors: Andrei Muresanu, Anvith Thudi, Michael R. Zhang, Nicolas Papernot | Published: 2024-02-01
Few-Shot Learning
Algorithm
Machine Unlearning

L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks

Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22
Algorithm
Watermarking
Cyber Attack

Training Differentially Private Ad Prediction Models with Semi-Sensitive Features

Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26
Algorithm
Watermarking
Privacy Protection Method

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method

Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications

Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16
DoS Mitigation
Algorithm
Malicious Node Detection