An Efficient Gradient-Based Inference Attack for Federated Learning Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17 Privacy AnalysisPerformance EvaluationFederated Learning 2025.12.17 2025.12.19 Literature Database
SeBERTis: A Framework for Producing Classifiers of Security-Related Issue Reports Authors: Sogol Masoumzadeh, Yufei Li, Shane McIntosh, Dániel Varró, Lili Wei | Published: 2025-12-17 Model DoSPerformance EvaluationDeep Learning Technology 2025.12.17 2025.12.19 Literature Database
A Transformer-Based Approach for DDoS Attack Detection in IoT Networks Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14 Data CollectionPerformance EvaluationResearch Methodology 2025.08.14 2025.08.16 Literature Database
DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT Authors: Baofu Han, Bing Li, Yining Qi, Raja Jurdak, Kaibin Huang, Chau Yuen | Published: 2025-07-22 Blockchain Strategy勾配分割手法Performance Evaluation 2025.07.22 2025.07.24 Literature Database
A Privacy-Preserving Indoor Localization System based on Hierarchical Federated Learning Authors: Masood Jan, Wafa Njima, Xun Zhang | Published: 2025-07-02 Privacy AssuranceDistributed LearningPerformance Evaluation 2025.07.02 2025.07.04 Literature Database
OBLIVIATE: Robust and Practical Machine Unlearning for Large Language Models Authors: Xiaoyu Xu, Minxin Du, Qingqing Ye, Haibo Hu | Published: 2025-05-07 Token Identification MethodModel DoSPerformance Evaluation 2025.05.07 2025.05.27 Literature Database
LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07 LLM SecurityPerformance EvaluationVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29 Online LearningPoisoningPerformance Evaluation 2025.04.29 2025.05.27 Literature Database
CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07 Program VerificationPerformance EvaluationVulnerability Analysis 2025.04.28 2025.05.27 Literature Database
Detecting Benchmark Contamination Through Watermarking Authors: Tom Sander, Pierre Fernandez, Saeed Mahloujifar, Alain Durmus, Chuan Guo | Published: 2025-02-24 | Updated: 2025-07-21 WatermarkingData Contamination DetectionPerformance Evaluation 2025.02.24 2025.07.23 Literature Database