Forcing Generative Models to Degenerate Ones: The Power of Data Poisoning Attacks Authors: Shuli Jiang, Swanand Ravindra Kadhe, Yi Zhou, Ling Cai, Nathalie Baracaldo | Published: 2023-12-07 LLM SecurityPoisoning AttackModel Performance Evaluation 2023.12.07 2025.05.28 Literature Database
A Unified Hardware-based Threat Detector for AI Accelerators Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28 FPGACybersecurityModel Performance Evaluation 2023.11.28 2025.05.28 Literature Database
Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
IoTGeM: Generalizable Models for Behaviour-Based IoT Attack Detection Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-10-17 Model Performance EvaluationTime-Related FeaturesFeature Selection Method 2023.10.17 2025.05.27 Literature Database
Demystifying Poisoning Backdoor Attacks from a Statistical Perspective Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding | Published: 2023-10-16 | Updated: 2023-10-18 PoisoningModel Performance EvaluationConvergence Property 2023.10.16 2025.05.28 Literature Database
A Comprehensive Study of Privacy Risks in Curriculum Learning Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16 Membership InferenceModel Performance EvaluationAttack Method 2023.10.16 2025.05.28 Literature Database
Enhancing ML-Based DoS Attack Detection Through Combinatorial Fusion Analysis Authors: Evans Owusu, Mohamed Rahouti, D. Frank Hsu, Kaiqi Xiong, Yufeng Xin | Published: 2023-10-02 DoS MitigationStacking ModelModel Performance Evaluation 2023.10.02 2025.05.28 Literature Database
Unbiased Watermark for Large Language Models Authors: Zhengmian Hu, Lichang Chen, Xidong Wu, Yihan Wu, Hongyang Zhang, Heng Huang | Published: 2023-09-22 | Updated: 2023-10-18 WatermarkingModel Performance EvaluationStatistical Hypothesis Testing 2023.09.22 2025.05.28 Literature Database
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference Authors: Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding | Published: 2023-08-20 MPC AlgorithmModel Performance EvaluationOptimization Methods 2023.08.20 2025.05.28 Literature Database
Attesting Distributional Properties of Training Data for Machine Learning Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09 Security AssuranceModel Performance EvaluationRobustness Evaluation 2023.08.18 2025.05.28 Literature Database