Analysis of Detection Methods

A Review of Various Datasets for Machine Learning Algorithm-Based Intrusion Detection System: Advances and Challenges

Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2025-06-03
Trigger Detection
Intrusion Detection System
Analysis of Detection Methods

ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural Networks

Authors: Zhan Cheng, Bolin Shen, Tianming Sha, Yuan Gao, Shibo Li, Yushun Dong | Published: 2025-03-20
Graph Neural Network
Model Performance Evaluation
Analysis of Detection Methods

Unmasking the Shadows: Pinpoint the Implementations of Anti-Dynamic Analysis Techniques in Malware Using LLM

Authors: Haizhou Wang, Nanqing Luo, Xusheng Li, Peng LIu | Published: 2024-11-08 | Updated: 2025-04-29
Malware Evolution
Attack Method
Analysis of Detection Methods

On the Detection of Image-Scaling Attacks in Machine Learning

Authors: Erwin Quiring, Andreas Müller, Konrad Rieck | Published: 2023-10-23
Backdoor Attack
Adversarial Attack Detection
Analysis of Detection Methods

The Looming Threat of Fake and LLM-generated LinkedIn Profiles: Challenges and Opportunities for Detection and Prevention

Authors: Navid Ayoobi, Sadat Shahriar, Arjun Mukherjee | Published: 2023-07-21
Data Generation
Prompt Injection
Analysis of Detection Methods

Can deepfakes be created by novice users?

Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28
Analysis of Detection Methods
Deep Learning Method
Challenges of Generative Models

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Authors: Mahnoor Shahid | Published: 2023-04-27
Analysis of Detection Methods
Machine Learning Method
Deep Learning Method

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02
Watermarking
Poisoning
Analysis of Detection Methods

A Watermark for Large Language Models

Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01
Watermarking
Prompt Injection
Analysis of Detection Methods

DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23
DNN IP Protection Method
Watermarking
Analysis of Detection Methods