Selection Method

Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test

Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11
API Security
Evaluation Method
Selection Method

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23
Identification of Signature Key
Selection Method
Hierarchical Classification Methods

Detection of Advanced Malware by Machine Learning Techniques

Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07
Malware Evolution
Random Forest
Selection Method

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13
Malware Detection
Research Methodology
Selection Method