X-CBA: Explainability Aided CatBoosted Anomal-E for Intrusion Detection System Authors: Kiymet Kaya, Elif Ak, Sumeyye Bas, Berk Canberk, Sule Gunduz Oguducu | Published: 2024-02-01 | Updated: 2024-06-02 Graph Neural NetworkXAI (Explainable AI)Intrusion Detection System 2024.02.01 2025.05.27 Literature Database
Unlearnable Algorithms for In-context Learning Authors: Andrei Muresanu, Anvith Thudi, Michael R. Zhang, Nicolas Papernot | Published: 2024-02-01 Few-Shot LearningAlgorithmMachine Unlearning 2024.02.01 2025.05.27 Literature Database
Ocassionally Secure: A Comparative Analysis of Code Generation Assistants Authors: Ran Elgedawy, John Sadik, Senjuti Dutta, Anuj Gautam, Konstantinos Georgiou, Farzin Gholamrezae, Fujiao Ji, Kyungchan Lim, Qian Liu, Scott Ruoti | Published: 2024-02-01 LLM Performance EvaluationCode GenerationPrompt Injection 2024.02.01 2025.05.27 Literature Database
Comparing Spectral Bias and Robustness For Two-Layer Neural Networks: SGD vs Adaptive Random Fourier Features Authors: Aku Kammonen, Lisi Liang, Anamika Pandey, Raúl Tempone | Published: 2024-02-01 WatermarkingBiasAdversarial Attack Detection 2024.02.01 2025.05.27 Literature Database
BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa | Published: 2024-02-01 | Updated: 2024-05-07 WatermarkingPrivacy ProtectionMembership Inference 2024.02.01 2025.05.27 Literature Database
opML: Optimistic Machine Learning on Blockchain Authors: KD Conway, Cathie So, Xiaohang Yu, Kartin Wong | Published: 2024-01-31 | Updated: 2024-02-05 WatermarkingBlockchain TechnologyMachine Learning Method 2024.01.31 2025.05.27 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems Authors: Mohammed Elnawawy, Mohammadreza Hallajiyan, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman | Published: 2024-01-30 | Updated: 2024-04-12 WatermarkingRisk ManagementThreats of Medical AI 2024.01.30 2025.05.27 Literature Database
A Cross-Language Investigation into Jailbreak Attacks in Large Language Models Authors: Jie Li, Yi Liu, Chongyang Liu, Ling Shi, Xiaoning Ren, Yaowen Zheng, Yang Liu, Yinxing Xue | Published: 2024-01-30 Character Role ActingPrompt InjectionMultilingual LLM Jailbreak 2024.01.30 2025.05.27 Literature Database
Data-Oblivious ML Accelerators using Hardware Security Extensions Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29 FPGAWatermarkingData Protection Method 2024.01.29 2025.05.27 Literature Database