Scalable Differential Privacy Mechanisms for Real-Time Machine Learning Applications

Authors: Jessica Smith, David Williams, Emily Brown | Published: 2024-09-16

CaBaGe: Data-Free Model Extraction using ClAss BAlanced Generator Ensemble

Authors: Jonathan Rosenthal, Shanchao Liang, Kevin Zhang, Lin Tan | Published: 2024-09-16

A Large-Scale Privacy Assessment of Android Third-Party SDKs

Authors: Mark Huasong Meng, Chuan Yan, Yun Hao, Qing Zhang, Zeyu Wang, Kailong Wang, Sin Gee Teo, Guangdong Bai, Jin Song Dong | Published: 2024-09-16

ContractTinker: LLM-Empowered Vulnerability Repair for Real-World Smart Contracts

Authors: Che Wang, Jiashuo Zhang, Jianbo Gao, Libin Xia, Zhi Guan, Zhong Chen | Published: 2024-09-15

Hacking, The Lazy Way: LLM Augmented Pentesting

Authors: Dhruva Goyal, Sitaraman Subramanian, Aditya Peela | Published: 2024-09-14

Federated Learning with Quantum Computing and Fully Homomorphic Encryption: A Novel Computing Paradigm Shift in Privacy-Preserving ML

Authors: Siddhant Dutta, Pavana P Karanth, Pedro Maciel Xavier, Iago Leal de Freitas, Nouhaila Innan, Sadok Ben Yahia, Muhammad Shafique, David E. Bernal Neira | Published: 2024-09-14 | Updated: 2024-10-12

DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification

Authors: Abdelkader El Mahdaouy, Salima Lamsiyah, Meryem Janati Idrissi, Hamza Alami, Zakaria Yartaoui, Ismail Berrada | Published: 2024-09-13

FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition

Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13

A Comprehensive Analysis of Machine Learning Based File Trap Selection Methods to Detect Crypto Ransomware

Authors: Mohan Anand Putrevu, Hrushikesh Chunduri, Venkata Sai Charan Putrevu, Sandeep K Shukla | Published: 2024-09-13

Sub-graph Based Diffusion Model for Link Prediction

Authors: Hang Li, Wei Jin, Geri Skenderi, Harry Shomer, Wenzhuo Tang, Wenqi Fan, Jiliang Tang | Published: 2024-09-13