I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05 Application Classification MethodChanges in User BehaviorMachine Learning Technology 2025.01.25 2025.05.27 Literature Database
Layered Uploading for Quantum Convolutional Neural Networks Authors: Grégoire Barrué, Tony Quertier, Orlane Zang | Published: 2024-04-15 | Updated: 2025-05-13 Model DesignLoss FunctionMachine Learning Technology 2024.04.15 2025.05.28 Literature Database
In-Context Unlearning: Language Models as Few Shot Unlearners Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06 Data LeakagePerformance EvaluationMachine Learning Technology 2023.10.11 2025.05.28 Literature Database
Compact: Approximating Complex Activation Functions for Secure Computation Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian | Published: 2023-09-09 | Updated: 2024-03-17 MPC AlgorithmMulti-Party ComputationMachine Learning Technology 2023.09.09 2025.05.28 Literature Database
MONDEO: Multistage Botnet Detection Authors: Duarte Dias, Bruno Sousa, Nuno Antunes | Published: 2023-08-31 Efficiency EvaluationUnknown Attack DetectionMachine Learning Technology 2023.08.31 2025.05.28 Literature Database
Conti Inc.: Understanding the Internal Discussions of a large Ransomware-as-a-Service Operator with Machine Learning Authors: Estelle Ruellan, Masarah Paquet-Clouston, Sebastian Garcia | Published: 2023-08-30 Interpretation of Topic ModelsClassification of Malicious ActorsMachine Learning Technology 2023.08.30 2025.05.28 Literature Database
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18 Data CollectionModel Performance EvaluationMachine Learning Technology 2023.08.18 2025.05.28 Literature Database
Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08 Cyber AttackMachine Learning Technology 2023.08.08 2025.05.28 Literature Database
Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08 Data Protection MethodMembership Disclosure RiskMachine Learning Technology 2023.08.08 2025.05.28 Literature Database
Exploiting Code Symmetries for Learning Program Semantics Authors: Kexin Pei, Weichen Li, Qirui Jin, Shuyang Liu, Scott Geng, Lorenzo Cavallaro, Junfeng Yang, Suman Jana | Published: 2023-08-07 | Updated: 2024-09-08 Program Interpretation GraphMachine Learning TechnologyVulnerability detection 2023.08.07 2025.05.28 Literature Database