Security
Unveiling and Mitigating Backdoor Vulnerabilities based on Unlearning Weight Changes and Backdoor Activeness
·3237 words·16 mins·
loading
·
loading
AI Generated
AI Applications
Security
🏢 Hong Kong University of Science and Technology
Two-Stage Backdoor Defense (TSBD) unveils and mitigates backdoor vulnerabilities by cleverly unlearning weight changes and suppressing backdoor neuron activeness, significantly improving the robustnes…
SWE-agent: Agent-Computer Interfaces Enable Automated Software Engineering
·10845 words·51 mins·
loading
·
loading
AI Applications
Security
🏢 Princeton University
SWE-agent achieves state-of-the-art performance on software engineering benchmarks by creating a custom agent-computer interface that enhances LM agents’ ability to use computers.
Suitable is the Best: Task-Oriented Knowledge Fusion in Vulnerability Detection
·3138 words·15 mins·
loading
·
loading
AI Generated
AI Applications
Security
🏢 Institute of Systems Engineering, Academy of Military Sciences, PLA
KF-GVD: a novel knowledge fusion-based method boosts vulnerability detection accuracy by integrating task-specific knowledge into graph neural networks, achieving significant performance gains and dis…
Stabilizing Linear Passive-Aggressive Online Learning with Weighted Reservoir Sampling
·7304 words·35 mins·
loading
·
loading
AI Generated
AI Applications
Security
🏢 Harvard University
Weighted reservoir sampling stabilizes online learning algorithms by creating a robust ensemble of intermediate solutions, significantly improving accuracy and mitigating sensitivity to outliers.
Regret Minimization in Stackelberg Games with Side Information
·415 words·2 mins·
loading
·
loading
AI Applications
Security
🏢 Carnegie Mellon University
This research shows how to improve Stackelberg game strategies by considering side information, achieving no-regret learning in online settings with stochastic contexts or followers.
DiffuPac: Contextual Mimicry in Adversarial Packets Generation via Diffusion Model
·3502 words·17 mins·
loading
·
loading
AI Applications
Security
🏢 Nagaoka University of Technology
DiffuPac generates realistic adversarial network packets evading NIDS detection without requiring specific NIDS knowledge, outperforming existing methods.
Conjugate Bayesian Two-step Change Point Detection for Hawkes Process
·1942 words·10 mins·
loading
·
loading
AI Applications
Security
🏢 Renmin University of China
A novel conjugate Bayesian two-step change point detection method for Hawkes processes, CoBay-CPD, achieves higher accuracy and efficiency by employing data augmentation for improved dynamic event mod…
BackTime: Backdoor Attacks on Multivariate Time Series Forecasting
·2166 words·11 mins·
loading
·
loading
AI Applications
Security
🏢 University of Illinois
BACKTIME unveils effective backdoor attacks on multivariate time series forecasting, highlighting vulnerabilities and offering novel defense strategies.