Radio Frequency Fingerprinting via Deep Learning: Challenges and Opportunities Authors: Saeif Al-Hazbi, Ahmed Hussain, Savio Sciancalepore, Gabriele Oligeri, Panos Papadimitratos | Published: 2023-10-25 | Updated: 2024-04-15 IoT Device IdentificationFingerprinting MethodModel Design 2023.10.25 2025.05.28 Literature Database
Enhancing Large Language Models for Secure Code Generation: A Dataset-driven Study on Vulnerability Mitigation Authors: Jiexin Wang, Liuwen Cao, Xitong Luo, Zhiping Zhou, Jiayuan Xie, Adam Jatowt, Yi Cai | Published: 2023-10-25 Security AnalysisSoftware SecurityPrompt Injection 2023.10.25 2025.05.28 Literature Database
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24 Data GenerationPoisoningAdversarial Attack Detection 2023.10.24 2025.05.28 Literature Database
Locally Differentially Private Document Generation Using Zero Shot Prompting Authors: Saiteja Utpala, Sara Hooker, Pin Yu Chen | Published: 2023-10-24 | Updated: 2023-11-30 Privacy TechniquePrompt InjectionMembership Inference 2023.10.24 2025.05.28 Literature Database
Ignore This Title and HackAPrompt: Exposing Systemic Vulnerabilities of LLMs through a Global Scale Prompt Hacking Competition Authors: Sander Schulhoff, Jeremy Pinto, Anaum Khan, Louis-François Bouchard, Chenglei Si, Svetlina Anati, Valen Tagliabue, Anson Liu Kost, Christopher Carnahan, Jordan Boyd-Graber | Published: 2023-10-24 | Updated: 2024-03-03 Text Generation MethodPrompt InjectionAttack Method 2023.10.24 2025.05.28 Literature Database
SoK: Memorization in General-Purpose Large Language Models Authors: Valentin Hartmann, Anshuman Suri, Vincent Bindschaedler, David Evans, Shruti Tople, Robert West | Published: 2023-10-24 Privacy TechniquePrompt InjectionMeasurement of Memorization 2023.10.24 2025.05.28 Literature Database
Deceptive Fairness Attacks on Graphs via Meta Learning Authors: Jian Kang, Yinglong Xia, Ross Maciejewski, Jiebo Luo, Hanghang Tong | Published: 2023-10-24 Graph Neural NetworkAttack Methodevaluation metrics 2023.10.24 2025.05.28 Literature Database
Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Thomas Steinke, Abhradeep Thakurta | Published: 2023-10-24 | Updated: 2024-05-04 Data GenerationPrivacy TechniqueModel Design 2023.10.24 2025.05.28 Literature Database
Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms Authors: Ye Tian, Haolei Weng, Yang Feng | Published: 2023-10-23 | Updated: 2024-06-14 Model DesignConvergence GuaranteeOptimization Methods 2023.10.23 2025.05.28 Literature Database
AutoDAN: Interpretable Gradient-Based Adversarial Attacks on Large Language Models Authors: Sicheng Zhu, Ruiyi Zhang, Bang An, Gang Wu, Joe Barrow, Zichao Wang, Furong Huang, Ani Nenkova, Tong Sun | Published: 2023-10-23 | Updated: 2023-12-14 Prompt InjectionSafety AlignmentAttack Method 2023.10.23 2025.05.28 Literature Database