A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT Authors: Mohammad Shamim Ahsan, Salekul Islam, Swakkhar Shatabda | Published: 2025-05-31 | Updated: 2025-06-03 Prompt InjectionIntrusion Detection SystemSelection and Evaluation of Optimization Algorithms 2025.05.31 2025.06.05 Literature Database
Optimizing ML Training with Metagradient Descent Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17 PoisoningSelection and Evaluation of Optimization AlgorithmsDeep Learning 2025.03.17 2025.05.27 Literature Database
SimPO: Simple Preference Optimization with a Reference-Free Reward Authors: Yu Meng, Mengzhou Xia, Danqi Chen | Published: 2024-05-23 | Updated: 2024-11-01 AlignmentSelection and Evaluation of Optimization AlgorithmsDeep Learning 2024.05.23 2025.05.27 Literature Database
WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12 CybersecurityRansomware AssessmentSelection and Evaluation of Optimization Algorithms 2024.03.12 2025.05.27 Literature Database
Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01 Threats of Medical AISelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.11.01 2025.05.28 Literature Database
Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30 Spam DetectionSelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Transferable Availability Poisoning Attacks Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06 PoisoningSelection and Evaluation of Optimization AlgorithmsMachine Learning Method 2023.10.08 2025.05.28 Literature Database
UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI Authors: Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic | Published: 2023-06-11 | Updated: 2023-06-13 UAV SecuritySelection and Evaluation of Optimization AlgorithmsCommunication Model 2023.06.11 2025.05.28 Literature Database
Towards Generating Adversarial Examples on Mixed-type Data Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17 Adversarial ExampleAdversarial Attack MethodsSelection and Evaluation of Optimization Algorithms 2022.10.17 2025.05.28 Literature Database
High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09 Algorithm DesignConvergence GuaranteeSelection and Evaluation of Optimization Algorithms 2022.07.04 2025.05.28 Literature Database