MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 データ前処理モデル性能評価侵入検知システム 2024.02.17 2025.04.03 文献データベース
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu | Published: 2024-02-17 | Updated: 2024-06-07 モデルの設計や精度モデル性能評価負の入力の近似誤差 2024.02.17 2025.04.03 文献データベース
Test-Time Backdoor Attacks on Multimodal Large Language Models Authors: Dong Lu, Tianyu Pang, Chao Du, Qian Liu, Xianjun Yang, Min Lin | Published: 2024-02-13 バックドア攻撃モデル性能評価攻撃手法 2024.02.13 2025.04.03 文献データベース
Differentially Private Training of Mixture of Experts Models Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11 LLM性能評価プライバシー保護手法モデル性能評価 2024.02.11 2025.04.03 文献データベース
Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09 AIの進化ウォーターマーキングモデル性能評価 2024.02.09 2025.04.03 文献データベース
IoT Network Traffic Analysis with Deep Learning Authors: Mei Liu, Leon Yang | Published: 2024-02-06 モデル性能評価深層学習手法異常検出手法 2024.02.06 2025.04.03 文献データベース
Homograph Attacks on Maghreb Sentiment Analyzers Authors: Fatima Zahra Qachfar, Rakesh M. Verma | Published: 2024-02-05 LLMセキュリティデータセット生成モデル性能評価 2024.02.05 2025.04.03 文献データベース
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 モデル性能評価透かし評価透明性と検証 2024.02.05 2025.04.03 文献データベース
Machine Unlearning in Large Language Models Authors: Kongyang Chen, Zixin Wang, Bing Mi, Waixi Liu, Shaowei Wang, Xiaojun Ren, Jiaxing Shen | Published: 2024-02-03 プライバシー保護手法モデル性能評価倫理的ガイドライン遵守 2024.02.03 2025.04.03 文献データベース
Localization of Dummy Data Injection Attacks in Power Systems Considering Incomplete Topological Information: A Spatio-Temporal Graph Wavelet Convolutional Neural Network Approach Authors: Zhaoyang Qu, Yunchang Dong, Yang Li, Siqi Song, Tao Jiang, Min Li, Qiming Wang, Lei Wang, Xiaoyong Bo, Jiye Zang, Qi Xu | Published: 2024-01-27 DDIADDIAの検出と位置特定モデル性能評価 2024.01.27 2025.04.03 文献データベース