Differentially Private In-Context Learning with Nearest Neighbor Search Authors: Antti Koskela, Tejas Kulkarni, Laith Zumot | Published: 2025-11-06 Privacy ProtectionPrivacy protection frameworkSelection Method 2025.11.06 2025.11.08 Literature Database
Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11 API SecurityEvaluation MethodSelection Method 2025.06.08 2025.06.13 Literature Database
Integrity Authentication in Tree Models Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23 Identification of Signature KeySelection MethodHierarchical Classification Methods 2022.05.30 2025.05.28 Literature Database
Detection of Advanced Malware by Machine Learning Techniques Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07 Malware EvolutionRandom ForestSelection Method 2019.03.07 2025.05.28 Literature Database
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13 Malware DetectionResearch MethodologySelection Method 2018.12.07 2025.05.28 Literature Database