Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27 Data-Driven ClusteringMalware Propagation MeansNatural Language Processing 2021.05.27 2025.05.28 Literature Database
Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26 Privacy Protection MethodMembership InferenceNatural Language Processing 2021.05.23 2025.05.28 Literature Database
TextHide: Tackling Data Privacy in Language Understanding Tasks Authors: Yangsibo Huang, Zhao Song, Danqi Chen, Kai Li, Sanjeev Arora | Published: 2020-10-12 Membership InferenceInformation-Theoretic PrivacyNatural Language Processing 2020.10.12 2025.05.28 Literature Database
FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications Authors: Dou Goodman, Lv Zhonghou, Wang minghua | Published: 2020-01-31 Text Perturbation MethodAdversarial Perturbation TechniquesNatural Language Processing 2020.01.31 2025.05.28 Literature Database