Similar Items: Assessing Generalisation Capability of Machine Learning Models for Intrusion Detection
- A Comparative Analysis of Machine Learning Models for Intrusion Detection in Intelligent Transport Systems
- Evaluating Tabular Representation Learning for Network Intrusion Detection
- Jailbroken Frontier Models Retain Their Capabilities
- A Pragmatic Comparison of Cryptographic Computation Technologies for Machine Learning
- Fight Poison with Poison: Enhancing Robustness in Few-shot Machine-Generated Text Detection with Adversarial Training
- Privacy Preserving Machine Learning Workflow: from Anonymization to Personalized Differential Privacy Budgets in Federated Learning