Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26 Privacy IssuesModel evaluation methodsWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26 Model evaluation methodsLarge Language ModelWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Detecting Quishing Attacks with Machine Learning Techniques Through QR Code Analysis Authors: Fouad Trad, Ali Chehab | Published: 2025-05-06 Phishing DetectionModel evaluation methodsMachine Learning Algorithm 2025.05.06 2025.05.27 Literature Database
ExpProof : Operationalizing Explanations for Confidential Models with ZKPs Authors: Chhavi Yadav, Evan Monroe Laufer, Dan Boneh, Kamalika Chaudhuri | Published: 2025-02-06 | Updated: 2025-05-27 XAI (Explainable AI)Model evaluation methodsInterpretability 2025.02.06 2025.05.29 Literature Database
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04 Model evaluation methodsMachine LearningFeature Importance Analysis 2019.09.04 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21 Terror Attack Data ClassificationModel evaluation methodsDeep Learning Method 2019.01.19 2025.05.28 Literature Database
Data mining for detecting Bitcoin Ponzi schemes Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01 Data CollectionModel evaluation methodsImbalanced Dataset 2018.03.01 2025.05.28 Literature Database
Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 Data CollectionModel evaluation methodsMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Understanding and Enhancing the Transferability of Adversarial Examples Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27 Model evaluation methodsAdversarial LearningAdversarial Attack Analysis 2018.02.27 2025.05.28 Literature Database