Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries Authors: Louis Hackländer-Jansen, Rafael Uetz, Martin Henze | Published: 2025-12-17 攻撃計画手法Literature List自動化された脅威エミュレーション 2025.12.17 2025.12.19 Literature Database
A Geometric Framework for Adversarial Vulnerability in Machine Learning Authors: Brian Bell | Published: 2024-07-03 PoisoningAdversarial ExampleLiterature List 2024.07.03 2025.05.27 Literature Database
Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27 Dataset GenerationModel Performance EvaluationLiterature List 2023.12.27 2025.05.27 Literature Database
Classification of Spam URLs Using Machine Learning Approaches Authors: Omar Husni Odeh, Anas Arram, Murad Njoum | Published: 2023-09-10 | Updated: 2023-12-03 Spam DetectionLiterature ListMachine Learning Method 2023.09.10 2025.05.28 Literature Database
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18 LLM ApplicationPrompt InjectionLiterature List 2023.06.07 2025.05.28 Literature Database
Adversarial Attacks and Defenses for Speech Recognition Systems Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31 Vulnerability of Adversarial ExamplesLiterature ListDefense Mechanism 2021.03.31 2025.05.28 Literature Database