Selection and Evaluation of Optimization Algorithms

A Systematic Review of Metaheuristics-Based and Machine Learning-Driven Intrusion Detection Systems in IoT

Authors: Mohammad Shamim Ahsan, Salekul Islam, Swakkhar Shatabda | Published: 2025-05-31 | Updated: 2025-06-03
Prompt Injection
Intrusion Detection System
Selection and Evaluation of Optimization Algorithms

Optimizing ML Training with Metagradient Descent

Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17
Poisoning
Selection and Evaluation of Optimization Algorithms
Deep Learning

SimPO: Simple Preference Optimization with a Reference-Free Reward

Authors: Yu Meng, Mengzhou Xia, Danqi Chen | Published: 2024-05-23 | Updated: 2024-11-01
Alignment
Selection and Evaluation of Optimization Algorithms
Deep Learning

WannaLaugh: A Configurable Ransomware Emulator — Learning to Mimic Malicious Storage Traces

Authors: Dionysios Diamantopoulos, Roman Pletka, Slavisa Sarafijanovic, A. L. Narasimha Reddy, Haris Pozidis | Published: 2024-03-12 | Updated: 2024-06-12
Cybersecurity
Ransomware Assessment
Selection and Evaluation of Optimization Algorithms

Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes

Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01
Threats of Medical AI
Selection and Evaluation of Optimization Algorithms
Computational Efficiency

Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction

Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30
Spam Detection
Selection and Evaluation of Optimization Algorithms
Computational Efficiency

Transferable Availability Poisoning Attacks

Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06
Poisoning
Selection and Evaluation of Optimization Algorithms
Machine Learning Method

UAV Trajectory and Multi-User Beamforming Optimization for Clustered Users Against Passive Eavesdropping Attacks With Unknown CSI

Authors: Aly Sabri Abdalla, Ali Behfarnia, Vuk Marojevic | Published: 2023-06-11 | Updated: 2023-06-13
UAV Security
Selection and Evaluation of Optimization Algorithms
Communication Model

Towards Generating Adversarial Examples on Mixed-type Data

Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17
Adversarial Example
Adversarial Attack Methods
Selection and Evaluation of Optimization Algorithms

High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09
Algorithm Design
Convergence Guarantee
Selection and Evaluation of Optimization Algorithms