AIセキュリティポータルbot

Watch Your Language: Investigating Content Moderation with Large Language Models

Authors: Deepak Kumar, Yousef AbuHashem, Zakir Durumeric | Published: 2023-09-25 | Updated: 2024-01-17
LLM Performance Evaluation
Prompt Injection
Inappropriate Content Generation

Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing

Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09
Poisoning
Dimensionality Reduction Method
Federated Learning

LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference

Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04
Watermarking
Performance Evaluation
Deep Learning Method

Can LLM-Generated Misinformation Be Detected?

Authors: Canyu Chen, Kai Shu | Published: 2023-09-25 | Updated: 2024-04-23
LLM Performance Evaluation
Prompt Injection
Inappropriate Content Generation

Unbiased Watermark for Large Language Models

Authors: Zhengmian Hu, Lichang Chen, Xidong Wu, Yihan Wu, Hongyang Zhang, Heng Huang | Published: 2023-09-22 | Updated: 2023-10-18
Watermarking
Model Performance Evaluation
Statistical Hypothesis Testing

The Reversal Curse: LLMs trained on “A is B” fail to learn “B is A”

Authors: Lukas Berglund, Meg Tong, Max Kaufmann, Mikita Balesni, Asa Cooper Stickland, Tomasz Korbak, Owain Evans | Published: 2023-09-21 | Updated: 2024-05-26
Hallucination
Model Evaluation
Bias in Training Data

Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation

Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28
Data Protection Method
Data Generation
Privacy Technique

How Robust is Google’s Bard to Adversarial Image Attacks?

Authors: Yinpeng Dong, Huanran Chen, Jiawei Chen, Zhengwei Fang, Xiao Yang, Yichi Zhang, Yu Tian, Hang Su, Jun Zhu | Published: 2023-09-21 | Updated: 2023-10-14
Adversarial Training
Defense Method
Face Recognition

“It’s a Fair Game”, or Is It? Examining How Users Navigate Disclosure Risks and Benefits When Using LLM-Based Conversational Agents

Authors: Zhiping Zhang, Michelle Jia, Hao-Ping Lee, Bingsheng Yao, Sauvik Das, Ada Lerner, Dakuo Wang, Tianshi Li | Published: 2023-09-20 | Updated: 2024-04-02
Data Leakage
Privacy Technique
User Education

FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning

Authors: Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Taotao Cai, Xiaofeng Zhu, Qing Li | Published: 2023-09-19 | Updated: 2024-02-02
Algorithm
Privacy Technique
Federated Learning