MILE: A Mutation Testing Framework of In-Context Learning Systems

Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07

A Comprehensive Survey of Advanced Persistent Threat Attribution: Taxonomy, Methods, Challenges and Open Research Problems

Authors: Nanda Rani, Bikash Saha, Sandeep Kumar Shukla | Published: 2024-09-07 | Updated: 2024-10-06

The Kubernetes Security Landscape: AI-Driven Insights from Developer Discussions

Authors: J. Alexander Curtis, Nasir U. Eisty | Published: 2024-09-06

Enhancing Quantum Security over Federated Learning via Post-Quantum Cryptography

Authors: Pingzhi Li, Tianlong Chen, Junyu Liu | Published: 2024-09-06

Training quantum machine learning models on cloud without uploading the data

Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07

Comment on Revisiting Neural Program Smoothing for Fuzzing

Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06

Exploring User Privacy Awareness on GitHub: An Empirical Study

Authors: Costanza Alfieri, Juri Di Rocco, Paola Inverardi, Phuong T. Nguyen | Published: 2024-09-06 | Updated: 2024-09-10

Understanding Data Importance in Machine Learning Attacks: Does Valuable Data Pose Greater Harm?

Authors: Rui Wen, Michael Backes, Yang Zhang | Published: 2024-09-05

Robust Q-Learning under Corrupted Rewards

Authors: Sreejeet Maity, Aritra Mitra | Published: 2024-09-05

Towards Autonomous Cybersecurity: An Intelligent AutoML Framework for Autonomous Intrusion Detection

Authors: Li Yang, Abdallah Shami | Published: 2024-09-05