Unveiling Malware Patterns: A Self-analysis Perspective Authors: Fangtian Zhong, Qin Hu, Yili Jiang, Jiaqi Huang, Xiuzhen Cheng | Published: 2025-01-10 2025.01.10 2025.04.03 文献データベース
Autonomous Identity-Based Threat Segmentation in Zero Trust Architectures Authors: Sina Ahmadi | Published: 2025-01-10 2025.01.10 2025.04.03 文献データベース
IoT Firmware Version Identification Using Transfer Learning with Twin Neural Networks Authors: Ashley Andrews, George Oikonomou, Simon Armour, Paul Thomas, Thomas Cattermole | Published: 2025-01-10 2025.01.10 2025.04.03 文献データベース
Learning-based Detection of GPS Spoofing Attack for Quadrotors Authors: Pengyu Wang, Zhaohua Yang, Jialu Li, Ling Shi | Published: 2025-01-10 2025.01.10 2025.04.03 文献データベース
Infecting Generative AI With Viruses Authors: David Noever, Forrest McKee | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database Authors: Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu | Published: 2025-01-09 | Updated: 2025-01-13 2025.01.09 2025.04.03 文献データベース
Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering Authors: Matteo Esposito | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース