Optimized Ensemble Model Towards Secured Industrial IoT Devices

Authors: MohammadNoor Injadat | Published: 2024-01-10

Local Privacy-preserving Mechanisms and Applications in Machine Learning

Authors: Likun Qin, Tianshuo Qiu | Published: 2024-01-08

Privacy-Preserving in Blockchain-based Federated Learning Systems

Authors: Sameera K. M., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Rafidha Rehiman K. A., Vinod P, Mauro Conti | Published: 2024-01-07

Detecting Anomalies in Blockchain Transactions using Machine Learning Classifiers and Explainability Analysis

Authors: Mohammad Hasan, Mohammad Shahriar Rahman, Helge Janicke, Iqbal H. Sarker | Published: 2024-01-07

Malla: Demystifying Real-world Large Language Model Integrated Malicious Services

Authors: Zilong Lin, Jian Cui, Xiaojing Liao, XiaoFeng Wang | Published: 2024-01-06 | Updated: 2024-08-19

The Dawn After the Dark: An Empirical Study on Factuality Hallucination in Large Language Models

Authors: Junyi Li, Jie Chen, Ruiyang Ren, Xiaoxue Cheng, Wayne Xin Zhao, Jian-Yun Nie, Ji-Rong Wen | Published: 2024-01-06

MalModel: Hiding Malicious Payload in Mobile Deep Learning Models with Black-box Backdoor Attack

Authors: Jiayi Hua, Kailong Wang, Meizhen Wang, Guangdong Bai, Xiapu Luo, Haoyu Wang | Published: 2024-01-05

Evasive Hardware Trojan through Adversarial Power Trace

Authors: Behnam Omidi, Khaled N. Khasawneh, Ihsen Alouani | Published: 2024-01-04

Adaptive Differential Privacy in Federated Learning: A Priority-Based Approach

Authors: Mahtab Talaei, Iman Izadi | Published: 2024-01-04

Mining Temporal Attack Patterns from Cyberthreat Intelligence Reports

Authors: Md Rayhanur Rahman, Brandon Wroblewski, Quinn Matthews, Brantley Morgan, Tim Menzies, Laurie Williams | Published: 2024-01-03