Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 Data Generation MethodTraining MethodWatermark 2025.08.25 2025.08.27 Literature Database
LLM Unlearning Should Be Form-Independent Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09 Training MethodCertified Robustness非意味的リダイレクション 2025.06.09 2025.06.11 Literature Database
Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23 LLM Performance EvaluationTraining MethodPrompt leaking 2025.04.23 2025.05.27 Literature Database
Is poisoning a real threat to LLM alignment? Maybe more so than you think Authors: Pankayaraj Pathmanathan, Souradip Chakraborty, Xiangyu Liu, Yongyuan Liang, Furong Huang | Published: 2024-06-17 | Updated: 2025-06-09 Training MethodBackdoor Attack TechniquesDetection of Poisonous Data 2024.06.17 2025.06.11 Literature Database
Protecting the integrity of the training procedure of neural networks Authors: Christian Berghoff | Published: 2020-05-14 Data DependencyTraining MethodMachine Learning Algorithm 2020.05.14 2025.05.28 Literature Database
High Accuracy Phishing Detection Based on Convolutional Neural Networks Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08 URL-based DetectionTraining MethodMachine Learning Technology 2020.04.08 2025.05.28 Literature Database
DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08 Training MethodPrivacy Protection MethodUser Activity Analysis 2020.03.23 2025.05.28 Literature Database
One Neuron to Fool Them All Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09 Training MethodRobustnessAdversarial Example 2020.03.20 2025.05.28 Literature Database
Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14 Training MethodHyperparameter OptimizationRobustness 2020.03.19 2025.05.28 Literature Database
Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19 Error Correction CodeTraining MethodPrivacy Protection Method 2020.03.18 2025.05.28 Literature Database