NET-SA: An Efficient Secure Aggregation Architecture Based on In-Network Computing Authors: Qingqing Ren, Wen Wang, Shuyong Zhu, Zhiyuan Wu, Yujun Zhang | Published: 2025-01-02 2025.01.02 2025.04.03 文献データベース
MalCL: Leveraging GAN-Based Generative Replay to Combat Catastrophic Forgetting in Malware Classification Authors: Jimin Park, AHyun Ji, Minji Park, Mohammad Saidur Rahman, Se Eun Oh | Published: 2025-01-02 2025.01.02 2025.04.03 文献データベース
HoneypotNet: Backdoor Attacks Against Model Extraction Authors: Yixu Wang, Tianle Gu, Yan Teng, Yingchun Wang, Xingjun Ma | Published: 2025-01-02 2025.01.02 2025.04.03 文献データベース
A Sysmon Incremental Learning System for Ransomware Analysis and Detection Authors: Jamil Ispahany, MD Rafiqul Islam, M. Arif Khan, MD Zahidul Islam | Published: 2025-01-02 2025.01.02 2025.04.03 文献データベース
Image-based Multimodal Models as Intruders: Transferable Multimodal Attacks on Video-based MLLMs Authors: Linhao Huang, Xue Jiang, Zhiqiang Wang, Wentao Mo, Xi Xiao, Bo Han, Yongjie Yin, Feng Zheng | Published: 2025-01-02 | Updated: 2025-01-10 2025.01.02 2025.04.03 文献データベース
SPADE: Enhancing Adaptive Cyber Deception Strategies with Generative AI and Structured Prompt Engineering Authors: Shihab Ahmed, A B M Mohaimenur Rahman, Md Morshed Alam, Md Sajidul Islam Sajid | Published: 2025-01-01 2025.01.01 2025.04.03 文献データベース
Shifting-Merging: Secure, High-Capacity and Efficient Steganography via Large Language Models Authors: Minhao Bai, Jinshuai Yang, Kaiyi Pang, Yongfeng Huang, Yue Gao | Published: 2025-01-01 2025.01.01 2025.04.03 文献データベース
Beyond Static Datasets: A Behavior-Driven Entity-Specific Simulation to Overcome Data Scarcity and Train Effective Crypto Anti-Money Laundering Models Authors: Dinesh Srivasthav P, Manoj Apte | Published: 2025-01-01 2025.01.01 2025.04.03 文献データベース
Ensuring superior learning outcomes and data security for authorized learner Authors: Jeongho Bang, Wooyeong Song, Kyujin Shin, Yong-Su Kim | Published: 2025-01-01 2025.01.01 2025.04.03 文献データベース
SPDZCoder: Combining Expert Knowledge with LLMs for Generating Privacy-Computing Code Authors: Xiaoning Dong, Peilin Xin, Jia Li, Wei Xu | Published: 2024-12-31 | Updated: 2025-03-21 2024.12.31 2025.04.03 文献データベース