Attacking Delay-based PUFs with Minimal Adversary Model Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01 Evaluation Methods for PUFModel Performance EvaluationAttack Method 2024.03.01 2025.05.27 Literature Database
Verifiable Boosted Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Claudio Lucchese, Giulio Ermanno Pibiri | Published: 2024-02-22 Model Performance EvaluationRobustness EvaluationOptimization Problem 2024.02.22 2025.05.27 Literature Database
An Explainable Transformer-based Model for Phishing Email Detection: A Large Language Model Approach Authors: Mohammad Amaz Uddin, Iqbal H. Sarker | Published: 2024-02-21 Phishing DetectionModel InterpretabilityModel Performance Evaluation 2024.02.21 2025.05.27 Literature Database
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 Data PreprocessingModel Performance EvaluationIntrusion Detection System 2024.02.17 2025.05.27 Literature Database
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu | Published: 2024-02-17 | Updated: 2024-06-07 Model Design and AccuracyModel Performance EvaluationApproximation Error of Negative Inputs 2024.02.17 2025.05.27 Literature Database
Test-Time Backdoor Attacks on Multimodal Large Language Models Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13 Backdoor AttackModel Performance EvaluationAttack Method 2024.02.13 2025.05.27 Literature Database
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM Performance EvaluationPrivacy Protection MethodModel Performance Evaluation 2024.02.11 2025.05.27 Literature Database
Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09 Evolution of AIWatermarkingModel Performance Evaluation 2024.02.09 2025.05.27 Literature Database
IoT Network Traffic Analysis with Deep Learning Authors: Mei Liu, Leon Yang | Published: 2024-02-06 Model Performance EvaluationDeep Learning MethodAnomaly Detection Method 2024.02.06 2025.05.27 Literature Database
Homograph Attacks on Maghreb Sentiment Analyzers Authors: Fatima Zahra Qachfar, Rakesh M. Verma | Published: 2024-02-05 LLM SecurityDataset GenerationModel Performance Evaluation 2024.02.05 2025.05.27 Literature Database