Privacy-Preserving Dynamic Assortment Selection

Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29

Resilience in Knowledge Graph Embeddings

Authors: Arnab Sharma, N'Dah Jean Kouagou, Axel-Cyrille Ngonga Ngomo | Published: 2024-10-28

CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models

Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21

Integrating uncertainty quantification into randomized smoothing based robustness guarantees

Authors: Sina Däubener, Kira Maag, David Krueger, Asja Fischer | Published: 2024-10-27

On the Geometry of Regularization in Adversarial Training: High-Dimensional Asymptotics and Generalization Bounds

Authors: Matteo Vilucchio, Nikolaos Tsilivis, Bruno Loureiro, Julia Kempe | Published: 2024-10-21

Jailbreaking and Mitigation of Vulnerabilities in Large Language Models

Authors: Benji Peng, Keyu Chen, Qian Niu, Ziqian Bi, Ming Liu, Pohsun Feng, Tianyang Wang, Lawrence K. Q. Yan, Yizhu Wen, Yichao Zhang, Caitlyn Heqi Yin | Published: 2024-10-20 | Updated: 2025-05-08

A Novel Reinforcement Learning Model for Post-Incident Malware Investigations

Authors: Dipo Dunsin, Mohamed Chahine Ghanem, Karim Ouazzane, Vassil Vassilev | Published: 2024-10-19 | Updated: 2025-01-12

Low-Rank Adversarial PGD Attack

Authors: Dayana Savostianova, Emanuele Zangrando, Francesco Tudisco | Published: 2024-10-16

Deep Learning Based XIoT Malware Analysis: A Comprehensive Survey, Taxonomy, and Research Challenges

Authors: Rami Darwish, Mahmoud Abdelsalam, Sajad Khorsandroo | Published: 2024-10-14

Denial-of-Service Poisoning Attacks against Large Language Models

Authors: Kuofeng Gao, Tianyu Pang, Chao Du, Yong Yang, Shu-Tao Xia, Min Lin | Published: 2024-10-14