Detecting Adversarial Directions in Deep Reinforcement Learning to Make Robust Decisions

Authors: Ezgi Korkmaz, Jonah Brown-Cohen | Published: 2023-06-09

DETECTA: Investigación de metodologías no intrusivas apoyadas en tecnologías habilitadoras 4.0 para abordar un mantenimiento predictivo y ciberseguro en pymes industriales

Authors: Alvaro García, Alejandro Echeverría, José Félix Ovejero | Published: 2023-06-09

JABBERWOCK: A Tool for WebAssembly Dataset Generation and Its Application to Malicious Website Detection

Authors: Chika Komiya, Naoto Yanai, Kyosuke Yamashita, Shingo Okamura | Published: 2023-06-09

Intrusion Detection Systems for Flying Ad-hoc Networks

Authors: Jordan Quinn, Safdar Hussain Bouk | Published: 2023-06-08

Prompt Injection attack against LLM-integrated Applications

Authors: Yi Liu, Gelei Deng, Yuekang Li, Kailong Wang, Zihao Wang, Xiaofeng Wang, Tianwei Zhang, Yepang Liu, Haoyu Wang, Yan Zheng, Yang Liu | Published: 2023-06-08 | Updated: 2024-03-02

FheFL: Fully Homomorphic Encryption Friendly Privacy-Preserving Federated Learning with Byzantine Users

Authors: Yogachandran Rahulamathavan, Charuka Herath, Xiaolan Liu, Sangarapillai Lambotharan, Carsten Maple | Published: 2023-06-08 | Updated: 2024-10-06

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting

Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12

Machine Learning in Digital Forensics: A Systematic Literature Review

Authors: Tahereh Nayerifard, Haleh Amintoosi, Abbas Ghaemi Bafghi, Ali Dehghantanha | Published: 2023-06-08

Flow-based Network Intrusion Detection Based on BERT Masked Language Model

Authors: Loc Gia Nguyen, Kohei Watabe | Published: 2023-06-08

Island-based Random Dynamic Voltage Scaling vs ML-Enhanced Power Side-Channel Attacks

Authors: Dake Chen, Christine Goins, Maxwell Waugaman, Georgios D. Dimou, Peter A. Beerel | Published: 2023-06-08 | Updated: 2023-06-13