Generating Practical Adversarial Network Traffic Flows Using NIDSGAN Authors: Bolor-Erdene Zolbayar, Ryan Sheatsley, Patrick McDaniel, Michael J. Weisman, Sencun Zhu, Shitong Zhu, Srikanth Krishnamurthy | Published: 2022-03-13 Active LearningNetwork Threat DetectionPerformance Evaluation 2022.03.13 2025.05.28 Literature Database
Training language models to follow instructions with human feedback Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04 AlignmentUser Behavior AnalysisPerformance Evaluation 2022.03.04 2025.05.28 Literature Database
ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21 PLC ProgrammingPerformance EvaluationMachine Learning Framework 2022.02.21 2025.05.28 Literature Database
Vulnerability Analysis of the Android Kernel Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20 Membership InferencePerformance EvaluationVulnerability Prediction 2021.12.20 2025.05.28 Literature Database
Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham | Published: 2021-10-06 Steganography TechniquesMalware Detection MethodPerformance Evaluation 2021.10.06 2025.05.28 Literature Database
Task-aware Privacy Preservation for Multi-dimensional Data Authors: Jiangnan Cheng, Ao Tang, Sandeep Chinchali | Published: 2021-10-05 | Updated: 2022-08-08 AlgorithmPrivacy Risk ManagementPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06 AlgorithmData GenerationPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Mobile authentication of copy detection patterns: how critical is to know fakes? Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 Data GenerationPerformance EvaluationIntellectual Property Protection 2021.10.05 2025.05.28 Literature Database
An energy-based model for neuro-symbolic reasoning on knowledge graphs Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04 AlgorithmPerformance EvaluationMachine Learning Application 2021.10.04 2025.05.28 Literature Database
Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters Authors: Han Wang | Published: 2021-10-04 Data LeakageFingerprinting MethodPerformance Evaluation 2021.10.04 2025.05.28 Literature Database