Model Performance Evaluation

Attacking Delay-based PUFs with Minimal Adversary Model

Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01
Evaluation Methods for PUF
Model Performance Evaluation
Attack Method

Verifiable Boosted Tree Ensembles

Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22
Model Performance Evaluation
Robustness Evaluation
Optimization Problem

An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach

Authors: Mohammad Amaz Uddin, Iqbal H. Sarker | Published: 2024-02-21
Phishing Detection
Model Interpretability
Model Performance Evaluation

MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs

Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22
Data Preprocessing
Model Performance Evaluation
Intrusion Detection System

Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement

Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu | Published: 2024-02-17 | Updated: 2024-06-07
Model Design and Accuracy
Model Performance Evaluation
Approximation Error of Negative Inputs

Test-Time Backdoor Attacks on Multimodal Large Language Models

Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13
Backdoor Attack
Model Performance Evaluation
Attack Method

Differentially Private Training of Mixture of Experts Models

Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11
LLM Performance Evaluation
Privacy Protection Method
Model Performance Evaluation

Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions

Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09
Evolution of AI
Watermarking
Model Performance Evaluation

IoT Network Traffic Analysis with Deep Learning

Authors: Mei Liu, Leon Yang | Published: 2024-02-06
Model Performance Evaluation
Deep Learning Method
Anomaly Detection Method

Homograph Attacks on Maghreb Sentiment Analyzers

Authors: Fatima Zahra Qachfar, Rakesh M. Verma | Published: 2024-02-05
LLM Security
Dataset Generation
Model Performance Evaluation