LLM-Enhanced Software Patch Localization

Authors: Jinhong Yu, Yi Chen, Di Tang, Xiaozhong Liu, XiaoFeng Wang, Chen Wu, Haixu Tang | Published: 2024-09-10 | Updated: 2024-09-13

Personalized Federated Learning Techniques: Empirical Analysis

Authors: Azal Ahmad Khan, Ahmad Faraz Khan, Haider Ali, Ali Anwar | Published: 2024-09-10

Ransomware Detection Using Machine Learning in the Linux Kernel

Authors: Adrian Brodzik, Tomasz Malec-Kruszyński, Wojciech Niewolski, Mikołaj Tkaczyk, Krzysztof Bocianiak, Sok-Yen Loui | Published: 2024-09-10

HexaCoder: Secure Code Generation via Oracle-Guided Synthetic Training Data

Authors: Hossein Hajipour, Lea Schönherr, Thorsten Holz, Mario Fritz | Published: 2024-09-10

A Pervasive, Efficient and Private Future: Realizing Privacy-Preserving Machine Learning Through Hybrid Homomorphic Encryption

Authors: Khoa Nguyen, Mindaugas Budzys, Eugene Frimpong, Tanveer Khan, Antonis Michalas | Published: 2024-09-10

VoiceWukong: Benchmarking Deepfake Voice Detection

Authors: Ziwei Yan, Yanjie Zhao, Haoyu Wang | Published: 2024-09-10

On the Weaknesses of Backdoor-based Model Watermarking: An Information-theoretic Perspective

Authors: Aoting Hu, Yanzhi Chen, Renjie Xie, Adrian Weller | Published: 2024-09-10

Privacy-Preserving Data Linkage Across Private and Public Datasets for Collaborative Agriculture Research

Authors: Osama Zafar, Rosemarie Santa Gonzalez, Gabriel Wilkins, Alfonso Morales, Erman Ayday | Published: 2024-09-09

Using Large Language Models for Template Detection from Security Event Logs

Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-03-23

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20