文献データベース

In-Context Retrieval-Augmented Language Models

Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01
RAG
データ生成手法
性能評価

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31
データ収集
暗号化トラフィック検出
異常検出手法

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31
サイバーセキュリティの自動化
データ収集
脆弱性検出

Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation

Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31
プライバシー保護技術
参加者選択手法
決定木

Robust Linear Regression: Gradient-descent, Early-stopping, and Beyond

Authors: Meyer Scetbon, Elvis Dohmatob | Published: 2023-01-31
収束分析
最適化手法
線形モデル

Behavioural Reports of Multi-Stage Malware

Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30
データ収集
モデル性能評価
動的分析

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30
バックドア攻撃
ベイジアン敵対的学習
ポイズニング

Deep Learning model integrity checking mechanism using watermarking technique

Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21
DNN IP保護手法
ウォーターマーキング
モデルアーキテクチャ

Gradient Shaping: Enhancing Backdoor Attack Against Reverse Engineering

Authors: Rui Zhu, Di Tang, Siyuan Tang, Guanhong Tao, Shiqing Ma, Xiaofeng Wang, Haixu Tang | Published: 2023-01-29 | Updated: 2024-03-02
ウォーターマーキング
ポイズニング
検出手法の分析

Cybersecurity Threat Hunting and Vulnerability Analysis Using a Neo4j Graph Database of Open Source Intelligence

Authors: Elijah Pelofske, Lorie M. Liebrock, Vincent Urias | Published: 2023-01-27 | Updated: 2024-10-07
サイバーセキュリティの自動化
情報収集手法
脆弱性管理