Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08 Algorithm DesignSecurity AssuranceData Obfuscation 2023.07.08 2025.05.28 Literature Database
A Natural Language Processing Approach to Malware Classification Authors: Ritik Mehta, Olha Jurečková, Mark Stamp | Published: 2023-07-07 Malware Classification Using CNNMalware Detection MethodEfficient Resolution of Learning Tasks 2023.07.07 2025.05.28 Literature Database
Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation Authors: Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong | Published: 2023-07-05 Control Action GenerationVehicle NetworkFederated Learning 2023.07.05 2025.05.28 Literature Database
Jailbroken: How Does LLM Safety Training Fail? Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05 Security AssurancePrompt InjectionAdversarial Attack Methods 2023.07.05 2025.05.28 Literature Database
Vulnerable Source Code Detection using SonarCloud Code Analysis Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05 Code Change AnalysisSystem ObservabilitySecurity Assurance 2023.07.05 2025.05.28 Literature Database
An Algorithm for Persistent Homology Computation Using Homomorphic Encryption Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04 Algorithm DesignComputational ComplexityWatermark Robustness 2023.07.04 2025.05.28 Literature Database
ProPILE: Probing Privacy Leakage in Large Language Models Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04 Data LeakagePrivacy ViolationPrompting Strategy 2023.07.04 2025.05.28 Literature Database
Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04 Algorithm DesignDataset GenerationData Obfuscation 2023.07.04 2025.05.28 Literature Database
Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04 Security AssuranceData LeakageMembership Inference 2023.07.04 2025.05.28 Literature Database
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 Feature Extraction MethodFeature Selection MethodComputational Efficiency 2023.07.04 2025.05.28 Literature Database