A Method for Network Intrusion Detection Using Flow Sequence and BERT Framework Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-10-26 Security AnalysisModel DesignAdversarial Attack Detection 2023.10.26 2025.05.28 Literature Database
Privately Aligning Language Models with Reinforcement Learning Authors: Fan Wu, Huseyin A. Inan, Arturs Backurs, Varun Chandrasekaran, Janardhan Kulkarni, Robert Sim | Published: 2023-10-25 | Updated: 2024-05-03 Privacy TechniqueModel DesignNatural Language Processing 2023.10.25 2025.05.28 Literature Database
Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos | Published: 2023-10-25 | Updated: 2024-04-15 IoT Device IdentificationFingerprinting MethodModel Design 2023.10.25 2025.05.28 Literature Database
Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Thomas Steinke, Abhradeep Thakurta | Published: 2023-10-24 | Updated: 2024-05-04 Data GenerationPrivacy TechniqueModel Design 2023.10.24 2025.05.28 Literature Database
Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms Authors: Ye Tian, Haolei Weng, Yang Feng | Published: 2023-10-23 | Updated: 2024-06-14 Model DesignConvergence GuaranteeOptimization Methods 2023.10.23 2025.05.28 Literature Database
B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23 Privacy TechniqueModel DesignMachine Learning Method 2023.10.23 2025.05.28 Literature Database
REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models Authors: Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar | Published: 2023-10-18 | Updated: 2024-04-08 Data GenerationModel DesignMalicious Content Generation 2023.10.18 2025.05.28 Literature Database
The Efficacy of Transformer-based Adversarial Attacks in Security Domains Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17 Security AnalysisModel DesignAdversarial Example 2023.10.17 2025.05.28 Literature Database
Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04 Dataset GenerationModel DesignCommunication Model 2022.10.22 2025.05.28 Literature Database
Empowering Graph Representation Learning with Test-Time Graph Transformation Authors: Wei Jin, Tong Zhao, Jiayuan Ding, Yozen Liu, Jiliang Tang, Neil Shah | Published: 2022-10-07 | Updated: 2023-02-26 FrameworkModel DesignFeature Selection Method 2022.10.07 2025.05.28 Literature Database