Efficient Avoidance of Vulnerabilities in Auto-completed Smart Contract Code Using Vulnerability-constrained Decoding Authors: André Storhaug, Jingyue Li, Tianyuan Hu | Published: 2023-09-18 | Updated: 2023-10-06 Smart ContractSoftware SecurityVulnerability Mitigation Technique 2023.09.18 2025.05.28 Literature Database
Defending Against Alignment-Breaking Attacks via Robustly Aligned LLM Authors: Bochuan Cao, Yuanpu Cao, Lu Lin, Jinghui Chen | Published: 2023-09-18 | Updated: 2024-06-12 Prompt InjectionSafety AlignmentDefense Method 2023.09.18 2025.05.28 Literature Database
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services Authors: Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue | Published: 2023-09-15 | Updated: 2024-01-15 Data Protection MethodPrivacy TechniqueOverfitting and Memorization 2023.09.15 2025.05.28 Literature Database
Multi-Source Domain Adaptation meets Dataset Distillation through Dataset Dictionary Learning Authors: Eduardo Fernandes Montesuma, Fred Ngolè Mboula, Antoine Souloumiac | Published: 2023-09-14 WatermarkingData GenerationPerformance Evaluation 2023.09.14 2025.05.28 Literature Database
Mitigate Replication and Copying in Diffusion Models with Generalized Caption and Dual Fusion Enhancement Authors: Chenghao Li, Dake Chen, Yuke Zhang, Peter A. Beerel | Published: 2023-09-13 | Updated: 2024-01-23 Data GenerationPrivacy Techniqueevaluation metrics 2023.09.13 2025.05.28 Literature Database
A Comprehensive Analysis of the Role of Artificial Intelligence and Machine Learning in Modern Digital Forensics and Incident Response Authors: Dipo Dunsin, Mohamed C. Ghanem, Karim Ouazzane, Vassil Vassilev | Published: 2023-09-13 | Updated: 2023-12-03 Integration of AI and MLForensic ReportMalware Detection Method 2023.09.13 2025.05.28 Literature Database
Deep Nonparametric Convexified Filtering for Computational Photography, Image Synthesis and Adversarial Defense Authors: Jianqiao Wangni | Published: 2023-09-13 | Updated: 2023-09-14 WatermarkingPoisoningDeep Learning Method 2023.09.13 2025.05.28 Literature Database
Recovering from Privacy-Preserving Masking with Large Language Models Authors: Arpita Vats, Zhe Liu, Peng Su, Debjyoti Paul, Yingyi Ma, Yutong Pang, Zeeshan Ahmed, Ozlem Kalinli | Published: 2023-09-12 | Updated: 2023-12-14 LLM Performance EvaluationData Protection MethodPrivacy Technique 2023.09.12 2025.05.28 Literature Database
SABLE: Secure And Byzantine robust LEarning Authors: Antoine Choffrut, Rachid Guerraoui, Rafael Pinot, Renaud Sirdey, John Stephan, Martin Zuber | Published: 2023-09-11 | Updated: 2023-12-14 WatermarkingByzantine ResiliencePrivacy Protection Method 2023.09.11 2025.05.28 Literature Database
FuzzLLM: A Novel and Universal Fuzzing Framework for Proactively Discovering Jailbreak Vulnerabilities in Large Language Models Authors: Dongyu Yao, Jianshu Zhang, Ian G. Harris, Marcel Carlsson | Published: 2023-09-11 | Updated: 2024-04-14 LLM SecurityWatermarkingPrompt Injection 2023.09.11 2025.05.28 Literature Database