A Training Rate and Survival Heuristic for Inference and Robustness Evaluation (TRASHFIRE)

Authors: Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth | Published: 2024-01-24 | Updated: 2024-09-11

Predicting SSH keys in Open SSH Memory dumps

Authors: Florian Rascoussier | Published: 2024-01-24

Beimingwu: A Learnware Dock System

Authors: Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou | Published: 2024-01-24

ReposVul: A Repository-Level High-Quality Vulnerability Dataset

Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08

MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage

Authors: Ying Song, Balaji Palanisamy | Published: 2024-01-23 | Updated: 2025-01-26

Wasserstein Differential Privacy

Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23

Text Embedding Inversion Security for Multilingual Language Models

Authors: Yiyi Chen, Heather Lent, Johannes Bjerva | Published: 2024-01-22 | Updated: 2024-06-05

PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety

Authors: Zaibin Zhang, Yongting Zhang, Lijun Li, Hongzhi Gao, Lijun Wang, Huchuan Lu, Feng Zhao, Yu Qiao, Jing Shao | Published: 2024-01-22 | Updated: 2024-08-20

Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them

Authors: Chao Liu, Boxi Chen, Wei Shao, Chris Zhang, Kelvin Wong, Yi Zhang | Published: 2024-01-22 | Updated: 2024-01-27

Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni | Published: 2024-01-22