Hard-Label Cryptanalytic Extraction of Neural Network Models

Authors: Yi Chen, Xiaoyang Dong, Jian Guo, Yantian Shen, Anyu Wang, Xiaoyun Wang | Published: 2024-09-18

Advances in APPFL: A Comprehensive and Extensible Federated Learning Framework

Authors: Zilinghan Li, Shilan He, Ze Yang, Minseok Ryu, Kibaek Kim, Ravi Madduri | Published: 2024-09-17

Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments

Authors: Maria Rigaki, Carlos Catania, Sebastian Garcia | Published: 2024-09-17

Towards Novel Malicious Packet Recognition: A Few-Shot Learning Approach

Authors: Kyle Stein, Andrew A. Mahyari, Guillermo Francia III, Eman El-Sheikh | Published: 2024-09-17

Federated Learning for Smart Grid: A Survey on Applications and Potential Vulnerabilities

Authors: Zikai Zhang, Suman Rath, Jiaohao Xu, Tingsong Xiao | Published: 2024-09-16

Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications

Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16

CaBaGe: Data-Free Model Extraction using ClAss BAlanced Generator Ensemble

Authors: Jonathan Rosenthal, Shanchao Liang, Kevin Zhang, Lin Tan | Published: 2024-09-16

A Large-Scale Privacy Assessment of Android Third-Party SDKs

Authors: Mark Huasong Meng, Chuan Yan, Yun Hao, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong | Published: 2024-09-16

ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts

Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15

Hacking, The Lazy Way: LLM Augmented Pentesting

Authors: Dhruva Goyal, Sitaraman Subramanian, Aditya Peela | Published: 2024-09-14