Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03 Data GenerationVulnerability detectionQuantum Cryptography Technology 2023.08.01 2025.05.28 Literature Database
The GANfather: Controllable generation of malicious activity to improve defence systems Authors: Ricardo Ribeiro Pereira, Jacopo Bono, João Tiago Ascensão, David Aparício, Pedro Ribeiro, Pedro Bizarro | Published: 2023-07-25 CybersecurityData GenerationClassification of Malicious Actors 2023.07.25 2025.05.28 Literature Database
The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21 Data GenerationPrompt InjectionAnalysis of Detection Methods 2023.07.21 2025.05.28 Literature Database
ChatGPT for Digital Forensic Investigation: The Good, The Bad, and The Unknown Authors: Mark Scanlon, Frank Breitinger, Christopher Hargreaves, Jan-Niclas Hilgert, John Sheppard | Published: 2023-07-10 Data GenerationDigital ForensicsPrompt Engineering 2023.07.10 2025.05.28 Literature Database
Censoring chemical data to mitigate dual use risk Authors: Quintina L. Campbell, Jonathan Herington, Andrew D. White | Published: 2023-04-20 Data GenerationPrivacy TechniqueSafety Alignment 2023.04.20 2025.05.28 Literature Database
Few-shot Weakly-supervised Cybersecurity Anomaly Detection Authors: Rahul Kale, Vrizlynn L. L. Thing | Published: 2023-04-15 Few-Shot LearningData GenerationTraining Data Generation 2023.04.15 2025.05.28 Literature Database
SCART: Simulation of Cyber Attacks for Real-Time Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07 Data GenerationThreat modelingOperational Scenario 2023.04.07 2025.05.28 Literature Database
AI Model Disgorgement: Methods and Choices Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07 DNN IP Protection MethodWatermarkingData Generation 2023.04.07 2025.05.28 Literature Database
Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06 Data GenerationReinforcement LearningDeep Learning Method 2022.10.06 2025.05.28 Literature Database
Augmentation Backdoors Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29 Dataset GenerationData GenerationBackdoor Attack 2022.09.29 2025.05.28 Literature Database