Fooling SHAP with Output Shuffling Attacks Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Privacy in Federated Learning Authors: Jaydip Sen, Hetvi Waghela, Sneha Rakshit | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Large Language Models for Secure Code Assessment: A Multi-Language Empirical Study Authors: Kohei Dozono, Tiago Espinha Gasiba, Andrea Stocco | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
A RAG-Based Question-Answering Solution for Cyber-Attack Investigation and Attribution Authors: Sampath Rajapaksha, Ruby Rani, Erisa Karafili | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Multimodal Large Language Models for Phishing Webpage Detection and Identification Authors: Jehyun Lee, Peiyuan Lim, Bryan Hooi, Dinil Mon Divakaran | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Fast John Ellipsoid Computation with Differential Privacy Optimization Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12 2024.08.12 2025.04.03 文献データベース
Kov: Transferable and Naturalistic Black-Box LLM Attacks using Markov Decision Processes and Tree Search Authors: Robert J. Moss | Published: 2024-08-11 2024.08.11 2025.04.03 文献データベース
Using Retriever Augmented Large Language Models for Attack Graph Generation Authors: Renascence Tarafder Prapty, Ashish Kundu, Arun Iyengar | Published: 2024-08-11 2024.08.11 2025.04.03 文献データベース