Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 Dataset GenerationPerformance EvaluationVulnerability Management 2023.06.28 2025.05.28 Literature Database
An Intelligent Mechanism for Monitoring and Detecting Intrusions in IoT Devices Authors: Vitalina Holubenko, Paulo Silva, Carlos Bento | Published: 2023-06-23 Performance EvaluationThreat modelingFederated Learning 2023.06.23 2025.05.28 Literature Database
When Vision Fails: Text Attacks Against ViT and OCR Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12 Performance EvaluationAttack Pattern ExtractionWatermark Robustness 2023.06.12 2025.05.28 Literature Database
Augmenting Greybox Fuzzing with Generative AI Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11 FuzzingPrompt InjectionPerformance Evaluation 2023.06.11 2025.05.28 Literature Database
Efficient Skip Connections Realization for Secure Inference on Encrypted Data Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11 Privacy TechniqueReal-Time InferencePerformance Evaluation 2023.06.11 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database
Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27 Client ClusteringClustering methodsPerformance Evaluation 2023.03.28 2025.05.28 Literature Database
MGTBench: Benchmarking Machine-Generated Text Detection Authors: Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang | Published: 2023-03-26 | Updated: 2024-01-16 MGT Detection MethodPrompt InjectionPerformance Evaluation 2023.03.26 2025.05.28 Literature Database
In-Context Retrieval-Augmented Language Models Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01 RAGData Generation MethodPerformance Evaluation 2023.01.31 2025.05.28 Literature Database
Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03 Backdoor AttackPoisoningPerformance Evaluation 2023.01.03 2025.05.28 Literature Database