Data Extraction and Analysis

ALPS: Automated Least-Privilege Enforcement for Securing Serverless Functions

Authors: Changhee Shin, Bom Kim, Seungsoo Lee | Published: 2026-03-26
セキュリティアライメント
Data Extraction and Analysis
動的ポリシー適応

Forensic Implications of Localized AI: Artifact Analysis of Ollama, LM Studio, and llama.cpp

Authors: Shariq Murtuza | Published: 2026-03-25
LLM Performance Evaluation
Indirect Prompt Injection
Data Extraction and Analysis

Evasion-Resilient Detection of DNS-over-HTTPS Data Exfiltration: A Practical Evaluation and Toolkit

Authors: Adam Elaoumari | Published: 2025-12-23
Data Extraction and Analysis
Data Flow Analysis
トラフィック分類

On the Effectiveness of Membership Inference in Targeted Data Extraction from Large Language Models

Authors: Ali Al Sahili, Ali Chehab, Razane Tajeddine | Published: 2025-12-15
Data Extraction and Analysis
Prompt leaking
評価メトリクス

Identifying Likely-Reputable Blockchain Projects on Ethereum

Authors: Cyrus Malik, Josef Bajada, Joshua Ellul | Published: 2025-03-14
Data Extraction and Analysis
Risk Analysis Method
Feature Engineering

From Local to Global: A Graph RAG Approach to Query-Focused Summarization

Authors: Darren Edge, Ha Trinh, Newman Cheng, Joshua Bradley, Alex Chao, Apurva Mody, Steven Truitt, Dasha Metropolitansky, Robert Osazuwa Ness, Jonathan Larson | Published: 2024-04-24 | Updated: 2025-02-19
RAG
Explainability of Graph Machine Learning
Data Extraction and Analysis

Evaluating the Effectiveness of LLMs in Introductory Computer Science Education: A Semester-Long Field Study

Authors: Wenhan Lyu, Yimeng Wang, Tingting, Chung, Yifan Sun, Yixuan Zhang | Published: 2024-04-20 | Updated: 2024-05-03
Data Extraction and Analysis
Human-Centered Computing
Education and Follow-up

Machine Learning in Digital Forensics: A Systematic Literature Review

Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08
Watermarking
Data Extraction and Analysis
Image Forensics

Do Software Security Practices Yield Fewer Vulnerabilities?

Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15
Security label
Data Extraction and Analysis
Dynamic Vulnerability Management

LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data

Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic | Published: 2022-04-14
Algorithm Design
Data Extraction and Analysis
Machine Learning Application