Improved Flow Recovery from Packet Data

Authors: Anthony Kenyon, David Elizondo, Lipika Deka | Published: 2023-10-15

ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?

Authors: Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le | Published: 2023-10-15

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15

Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing

Authors: Marc Schmitt, Ivan Flechais | Published: 2023-10-15

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15

A Blockchain-empowered Multi-Aggregator Federated Learning Architecture in Edge Computing with Deep Reinforcement Learning Optimization

Authors: Xiao Li, Weili Wu | Published: 2023-10-14

BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14

DPZero: Private Fine-Tuning of Language Models without Backpropagation

Authors: Liang Zhang, Bingcong Li, Kiran Koshy Thekumparampil, Sewoong Oh, Niao He | Published: 2023-10-14 | Updated: 2024-06-06

On the Feasibility of Cross-Language Detection of Malicious Packages in npm and PyPI

Authors: Piergiorgio Ladisa, Serena Elisa Ponta, Nicola Ronzoni, Matias Martinez, Olivier Barais | Published: 2023-10-14

Risk-Aware and Explainable Framework for Ensuring Guaranteed Coverage in Evolving Hardware Trojan Detection

Authors: Rahul Vishwakarma, Amin Rezaei | Published: 2023-10-14