An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures Authors: Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis | Published: 2023-08-09 2023.08.09 2025.04.03 文献データベース
ModSec-AdvLearn: Countering Adversarial SQL Injections with Robust Machine Learning Authors: Giuseppe Floris, Christian Scano, Biagio Montaruli, Luca Demetrio, Andrea Valenza, Luca Compagna, Davide Ariu, Luca Piras, Davide Balzarotti, Battista Biggio | Published: 2023-08-09 | Updated: 2025-05-21 2023.08.09 文献データベース
Data-Free Model Extraction Attacks in the Context of Object Detection Authors: Harshit Shah, Aravindhan G, Pavan Kulkarni, Yuvaraj Govidarajulu, Manojkumar Parmar | Published: 2023-08-09 2023.08.09 2025.04.03 文献データベース
A Feature Set of Small Size for the PDF Malware Detection Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10 2023.08.09 2025.04.03 文献データベース
Data-Driven Intelligence can Revolutionize Today’s Cybersecurity World: A Position Paper Authors: Iqbal H. Sarker, Helge Janicke, Leandros Maglaras, Seyit Camtepe | Published: 2023-08-09 2023.08.09 2025.04.03 文献データベース
VulLibGen: Generating Names of Vulnerability-Affected Packages via a Large Language Model Authors: Tianyu Chen, Lin Li, Liuchuan Zhu, Zongyang Li, Xueqing Liu, Guangtai Liang, Qianxiang Wang, Tao Xie | Published: 2023-08-09 | Updated: 2024-05-18 2023.08.09 2025.04.03 文献データベース
Different Mechanisms of Machine Learning and Optimization Algorithms Utilized in Intrusion Detection Systems Authors: Mohammad Aziz, Ali Saeed Alfoudi | Published: 2023-08-08 2023.08.08 2025.04.03 文献データベース
A Survey on Decentralized Federated Learning Authors: Edoardo Gabrielli, Giovanni Pica, Gabriele Tolomei | Published: 2023-08-08 2023.08.08 2025.04.03 文献データベース
Pelta: Shielding Transformers to Mitigate Evasion Attacks in Federated Learning Authors: Simon Queyrut, Yérom-David Bromberg, Valerio Schiavoni | Published: 2023-08-08 2023.08.08 2025.04.03 文献データベース
Accurate, Explainable, and Private Models: Providing Recourse While Minimizing Training Data Leakage Authors: Catherine Huang, Chelse Swoopes, Christina Xiao, Jiaqi Ma, Himabindu Lakkaraju | Published: 2023-08-08 2023.08.08 2025.04.03 文献データベース