Model evaluation methods

Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs

Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26
Privacy Issues
Model evaluation methods
Watermarking Technology

Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities

Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26
Model evaluation methods
Large Language Model
Watermarking Technology

Detecting Quishing Attacks with Machine Learning Techniques Through QR Code Analysis

Authors: Fouad Trad, Ali Chehab | Published: 2025-05-06
Phishing Detection
Model evaluation methods
Machine Learning Algorithm

ExpProof : Operationalizing Explanations for Confidential Models with ZKPs

Authors: Chhavi Yadav, Evan Monroe Laufer, Dan Boneh, Kamalika Chaudhuri | Published: 2025-02-06 | Updated: 2025-05-27
XAI (Explainable AI)
Model evaluation methods
Interpretability

Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis

Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04
Model evaluation methods
Machine Learning
Feature Importance Analysis

A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29
Model evaluation methods
Adversarial Attack Methods
Deep Learning Technology

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism

Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21
Terror Attack Data Classification
Model evaluation methods
Deep Learning Method

Data mining for detecting Bitcoin Ponzi schemes

Authors: Massimo Bartoletti, Barbara Pes, Sergio Serusi | Published: 2018-03-01
Data Collection
Model evaluation methods
Imbalanced Dataset

Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain

Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27
Data Collection
Model evaluation methods
Machine Learning Technology

Understanding and Enhancing the Transferability of Adversarial Examples

Authors: Lei Wu, Zhanxing Zhu, Cheng Tai, Weinan E | Published: 2018-02-27
Model evaluation methods
Adversarial Learning
Adversarial Attack Analysis