PURL: Safe and Effective Sanitization of Link Decoration Authors: Shaoor Munir, Patrick Lee, Umar Iqbal, Zubair Shafiq, Sandra Siby | Published: 2023-08-07 | Updated: 2024-03-06 WatermarkingData Protection MethodData Collection 2023.08.07 2025.05.28 Literature Database
GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis Authors: Yuqiang Sun, Daoyuan Wu, Yue Xue, Han Liu, Haijun Wang, Zhengzi Xu, Xiaofei Xie, Yang Liu | Published: 2023-08-07 | Updated: 2024-05-06 WatermarkingVulnerability detectionStatic Analysis 2023.08.07 2025.05.28 Literature Database
Global Differential Privacy for Distributed Metaverse Healthcare Systems Authors: Mehdi Letafati, Safa Otoum | Published: 2023-07-22 | Updated: 2023-08-20 WatermarkingData Protection MethodMachine Learning Method 2023.07.22 2025.05.28 Literature Database
DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09 WatermarkingCyber AttackDigital Twin 2023.06.09 2025.05.28 Literature Database
Machine Learning in Digital Forensics: A Systematic Literature Review Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08 WatermarkingData Extraction and AnalysisImage Forensics 2023.06.08 2025.05.28 Literature Database
Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13 WatermarkingEnergy ManagementAttack Evaluation 2023.06.08 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
Human-imperceptible, Machine-recognizable Images Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06 WatermarkingPrivacy Enhancing TechnologyModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
Machine Unlearning: A Survey Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06 WatermarkingMembership InferenceModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14 WatermarkingPrivacy AssessmentFeature Extraction Method 2023.05.01 2025.05.28 Literature Database