Few-Shot Learning

TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation

Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15
Few-Shot Learning
RAG
Deep Learning

Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach

Authors: Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh | Published: 2024-09-17
Few-Shot Learning
Network Threat Detection
Malware Classification

MILE: A Mutation Testing Framework of In-Context Learning Systems

Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07
Few-Shot Learning
Mutation Testing
Evaluation Method

Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach

Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani | Published: 2024-06-04
DDoS Attack Detection
Few-Shot Learning
Prototype Network

Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data

Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23
Few-Shot Learning
Dataset Generation
Privacy Protection Method

Large Language Models in Wireless Application Design: In-Context Learning-enhanced Automatic Network Intrusion Detection

Authors: Han Zhang, Akram Bin Sediq, Ali Afana, Melike Erol-Kantarci | Published: 2024-05-17
Few-Shot Learning
LLM Performance Evaluation
Automated Intrusion Detection System

CBR — Boosting Adaptive Classification By Retrieval of Encrypted Network Traffic with Out-of-distribution

Authors: Amir Lukach, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-03-17
Few-Shot Learning
Malware Classification
Methods for Dynamically Identifying New Classes

DP-TabICL: In-Context Learning with Differentially Private Tabular Data

Authors: Alycia N. Carey, Karuna Bhaila, Kennedy Edemacu, Xintao Wu | Published: 2024-03-08
Few-Shot Learning
Privacy Protection Method
Prompt Injection

Measuring and Reducing LLM Hallucination without Gold-Standard Answers

Authors: Jiaheng Wei, Yuanshun Yao, Jean-Francois Ton, Hongyi Guo, Andrew Estornell, Yang Liu | Published: 2024-02-16 | Updated: 2024-06-06
Few-Shot Learning
Detection of Hallucinations
Watermark Evaluation

In-Context Learning Can Re-learn Forbidden Tasks

Authors: Sophie Xhonneux, David Dobre, Jian Tang, Gauthier Gidel, Dhanya Sridhar | Published: 2024-02-08
Few-Shot Learning
LLM Security
LLM Performance Evaluation