TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15 Few-Shot LearningRAGDeep Learning 2025.03.15 2025.05.27 Literature Database
Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach Authors: Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh | Published: 2024-09-17 Few-Shot LearningNetwork Threat DetectionMalware Classification 2024.09.17 2025.05.27 Literature Database
MILE: A Mutation Testing Framework of In-Context Learning Systems Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07 Few-Shot LearningMutation TestingEvaluation Method 2024.09.07 2025.05.27 Literature Database
Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani | Published: 2024-06-04 DDoS Attack DetectionFew-Shot LearningPrototype Network 2024.06.04 2025.05.27 Literature Database
Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23 Few-Shot LearningDataset GenerationPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17 Few-Shot LearningLLM Performance EvaluationAutomated Intrusion Detection System 2024.05.17 2025.05.27 Literature Database
CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17 Few-Shot LearningMalware ClassificationMethods for Dynamically Identifying New Classes 2024.03.17 2025.05.27 Literature Database
DP-TabICL: In-Context Learning with Differentially Private Tabular Data Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08 Few-Shot LearningPrivacy Protection MethodPrompt Injection 2024.03.08 2025.05.27 Literature Database
Measuring and Reducing LLM Hallucination without Gold-Standard Answers Authors: Jiaheng Wei, Yuanshun Yao, Jean-Francois Ton, Hongyi Guo, Andrew Estornell, Yang Liu | Published: 2024-02-16 | Updated: 2024-06-06 Few-Shot LearningDetection of HallucinationsWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
In-Context Learning Can Re-learn Forbidden Tasks Authors: Sophie Xhonneux, David Dobre, Jian Tang, Gauthier Gidel, Dhanya Sridhar | Published: 2024-02-08 Few-Shot LearningLLM SecurityLLM Performance Evaluation 2024.02.08 2025.05.27 Literature Database