Resource Consumption Threats in Large Language Models Authors: Yuanhe Zhang, Xinyue Wang, Zhican Chen, Weiliu Wang, Zilu Zhang, Zhengshuo Gong, Zhenhong Zhou, Li Sun, Yang Liu, Sen Su | Published: 2026-03-17 Model DoSResource Consumption AnalysisThreat modeling 2026.03.17 2026.03.25 Literature Database
Analyzing In-browser Cryptojacking Authors: Muhammad Saad, David Mohaisen | Published: 2023-04-26 Resource Consumption AnalysisCryptocurrency MiningStatic Analysis 2023.04.26 2025.05.28 Literature Database
Bandwidth Utilization Side-Channel on ML Inference Accelerators Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14 Resource Consumption AnalysisAdversarial Attack MethodsMachine Learning Algorithm 2021.10.14 2025.05.28 Literature Database
Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16 Cyber ThreatData Contamination DetectionResource Consumption Analysis 2021.08.02 2025.05.28 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.28 Literature Database