SPML: A DSL for Defending Language Models Against Prompt Attacks Authors: Reshabh K Sharma, Vinayak Gupta, Dan Grossman | Published: 2024-02-19 LLM SecuritySystem Prompt GenerationPrompt Injection 2024.02.19 2025.05.27 Literature Database
Evaluating Efficacy of Model Stealing Attacks and Defenses on Quantum Neural Networks Authors: Satwik Kundu, Debarshi Kundu, Swaroop Ghosh | Published: 2024-02-18 Dataset GenerationModel Extraction AttackDefense Method 2024.02.18 2025.05.27 Literature Database
MLSTL-WSN: Machine Learning-based Intrusion Detection using SMOTETomek in WSNs Authors: Md. Alamin Talukder, Selina Sharmin, Md Ashraf Uddin, Md Manowarul Islam, Sunil Aryal | Published: 2024-02-17 | Updated: 2024-02-22 Data PreprocessingModel Performance EvaluationIntrusion Detection System 2024.02.17 2025.05.27 Literature Database
Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques Authors: Joerg Osterrieder, Stephen Chan, Jeffrey Chu, Yuanyuan Zhang, Branka Hadji Misheva, Codruta Mare | Published: 2024-02-17 Blockchain TechnologyFraudulent TransactionAnomaly Detection Method 2024.02.17 2025.05.27 Literature Database
On the Role of Similarity in Detecting Masquerading Files Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17 CybersecurityIntegration of Digital Signatures and Machine LearningMalware Classification 2024.02.17 2025.05.27 Literature Database
Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu | Published: 2024-02-17 | Updated: 2024-06-07 Model Design and AccuracyModel Performance EvaluationApproximation Error of Negative Inputs 2024.02.17 2025.05.27 Literature Database
DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16 AlgorithmAdversarial TrainingWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
Private PAC Learning May be Harder than Online Learning Authors: Mark Bun, Aloni Cohen, Rathin Desai | Published: 2024-02-16 WatermarkingOnline LearningWatermark Evaluation 2024.02.16 2025.05.27 Literature Database
Using Hallucinations to Bypass GPT4’s Filter Authors: Benjamin Lemkin | Published: 2024-02-16 | Updated: 2024-03-11 LLM SecurityPrompt InjectionInappropriate Content Generation 2024.02.16 2025.05.27 Literature Database
On the Impact of Uncertainty and Calibration on Likelihood-Ratio Membership Inference Attacks Authors: Meiyi Zhu, Caili Guo, Chunyan Feng, Osvaldo Simeone | Published: 2024-02-16 | Updated: 2025-05-13 Membership InferenceQuantification of UncertaintyComputational Complexity 2024.02.16 2025.05.27 Literature Database