A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03 Trigger DetectionIntrusion Detection SystemAnalysis of Detection Methods 2025.06.03 2025.06.05 Literature Database
ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural Networks Authors: Zhan Cheng, Bolin Shen, Tianming Sha, Yuan Gao, Shibo Li, Yushun Dong | Published: 2025-03-20 Graph Neural NetworkModel Performance EvaluationAnalysis of Detection Methods 2025.03.20 2025.05.27 Literature Database
Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM Authors: Haizhou Wang, Nanqing Luo, Xusheng Li, Peng LIu | Published: 2024-11-08 | Updated: 2025-04-29 Malware EvolutionAttack MethodAnalysis of Detection Methods 2024.11.08 2025.05.27 Literature Database
On the Detection of Image-Scaling Attacks in Machine Learning Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23 Backdoor AttackAdversarial Attack DetectionAnalysis of Detection Methods 2023.10.23 2025.05.28 Literature Database
The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21 Data GenerationPrompt InjectionAnalysis of Detection Methods 2023.07.21 2025.05.28 Literature Database
Can deepfakes be created by novice users? Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28 Analysis of Detection MethodsDeep Learning MethodChallenges of Generative Models 2023.04.28 2025.05.28 Literature Database
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks Authors: Mahnoor Shahid | Published: 2023-04-27 Analysis of Detection MethodsMachine Learning MethodDeep Learning Method 2023.04.27 2025.05.28 Literature Database
Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02 WatermarkingPoisoningAnalysis of Detection Methods 2023.01.29 2025.05.28 Literature Database
A Watermark for Large Language Models Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01 WatermarkingPrompt InjectionAnalysis of Detection Methods 2023.01.24 2025.05.28 Literature Database
DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23 DNN IP Protection MethodWatermarkingAnalysis of Detection Methods 2023.01.23 2025.05.28 Literature Database