Machine Learning-Based Security Policy Analysis

Authors: Krish Jain, Joann Sum, Pranav Kapoor, Amir Eaman | Published: 2024-12-30 | Updated: 2025-01-06

Toward Intelligent and Secure Cloud: Large Language Model Empowered Proactive Defense

Authors: Yuyang Zhou, Guang Cheng, Kang Du, Zihan Chen, Yuyu Zhao | Published: 2024-12-30 | Updated: 2025-04-15

Robust Matrix Completion for Discrete Rating-Scale Data

Authors: Aurore Archimbaud, Andreas Alfons, Ines Wilms | Published: 2024-12-30

SecBench: A Comprehensive Multi-Dimensional Benchmarking Dataset for LLMs in Cybersecurity

Authors: Pengfei Jing, Mengyun Tang, Xiaorong Shi, Xing Zheng, Sen Nie, Shi Wu, Yong Yang, Xiapu Luo | Published: 2024-12-30 | Updated: 2025-01-06

A Multiparty Homomorphic Encryption Approach to Confidential Federated Kaplan Meier Survival Analysis

Authors: Narasimha Raghavan Veeraragavan, Svetlana Boudko, Jan Franz Nygård | Published: 2024-12-29

Standard-Deviation-Inspired Regularization for Improving Adversarial Robustness

Authors: Olukorede Fakorede, Modeste Atsague, Jin Tian | Published: 2024-12-27

CL-Attack: Textual Backdoor Attacks via Cross-Lingual Triggers

Authors: Jingyi Zheng, Tianyi Hu, Tianshuo Cong, Xinlei He | Published: 2024-12-26 | Updated: 2025-03-31

Detection and classification of DDoS flooding attacks by machine learning method

Authors: Dmytro Tymoshchuk, Oleh Yasniy, Mykola Mytnyk, Nataliya Zagorodna, Vitaliy Tymoshchuk | Published: 2024-12-25 | Updated: 2025-01-02

Fundamental Limits in the Search for Less Discriminatory Algorithms — and How to Avoid Them

Authors: Benjamin Laufer, Manisch Raghavan, Solon Barocas | Published: 2024-12-24

A Backdoor Attack Scheme with Invisible Triggers Based on Model Architecture Modification

Authors: Yuan Ma, Xu Ma, Jiankang Wei, Jinmeng Tang, Xiaoyu Zhang, Yilun Lyu, Kehao Chen, Jingtong Huang | Published: 2024-12-22 | Updated: 2025-01-06