Memory-Based Malware Detection under Limited Data Conditions: A Comparative Evaluation of TabPFN and Ensemble Models Authors: Valentin Leroy, Shuvalaxmi Dass, Sharif Ullah | Published: 2026-01-12 Data Selection StrategyPerformance Evaluation機械学習応用 2026.01.12 2026.01.14 Literature Database
UnPII: Unlearning Personally Identifiable Information with Quantifiable Exposure Risk Authors: Intae Jeon, Yujeong Kwon, Hyungjoon Koo | Published: 2026-01-05 Data Selection StrategyPrivacy Enhancing TechnologyModel Inversion 2026.01.05 2026.01.07 Literature Database
Certifying the Right to Be Forgotten: Primal-Dual Optimization for Sample and Label Unlearning in Vertical Federated Learning Authors: Yu Jiang, Xindi Tong, Ziyao Liu, Xiaoxi Zhang, Kwok-Yan Lam, Chee Wei Tan | Published: 2025-12-29 Data Selection StrategyMachine learningConvergence analysis 2025.12.29 2025.12.31 Literature Database
Casting a SPELL: Sentence Pairing Exploration for LLM Limitation-breaking Authors: Yifan Huang, Xiaojun Jia, Wenbo Guo, Yuqiang Sun, Yihao Huang, Chong Wang, Yang Liu | Published: 2025-12-24 Data Selection StrategyPrompt InjectionAdversarial Attack Detection 2025.12.24 2025.12.26 Literature Database
From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 RAGData Selection StrategyPrompt leaking 2025.12.22 2025.12.24 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 WatermarkingData Selection StrategyPrivacy Protection Method 2024.06.20 2025.05.27 Literature Database
What is in Your Safe Data? Identifying Benign Data that Breaks Safety Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20 Data Selection StrategyPrompt InjectionPsychological Manipulation 2024.04.01 2025.05.27 Literature Database
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection Authors: Akshit Jindal, Vikram Goyal, Saket Anand, Chetan Arora | Published: 2023-11-08 Data Selection StrategyMembership InferenceImprovement of Learning 2023.11.08 2025.05.28 Literature Database
A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16 Security AnalysisData Selection StrategyClassification Pattern Analysis 2022.06.16 2025.05.28 Literature Database