AIセキュリティポータルbot

Differentially Private Selection from Secure Distributed Computing

Authors: Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh | Published: 2023-06-07 | Updated: 2023-06-08
MPC Algorithm
Scalability Analysis
Privacy Enhancing Technology

Hardness of Deceptive Certificate Selection

Authors: Stephan Wäldchen | Published: 2023-06-07
Watermarking
Feature Selection Method
Certificate Ratio

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21
Algorithm
Challenges of Log Analysis
Feature Extraction Method

On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing

Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18
LLM Application
Prompt Injection
Literature List

Extracting Cloud-based Model with Prior Knowledge

Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13
Backdoor Attack
Attack Evaluation
Adversarial attack

Knowledge-Augmented Language Model Prompting for Zero-Shot Knowledge Graph Question Answering

Authors: Jinheon Baek, Alham Fikri Aji, Amir Saffari | Published: 2023-06-07
RAG
Movie Cast
Knowledge Graph

Exploring Model Dynamics for Accumulative Poisoning Discovery

Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06
Backdoor Attack
Model Design and Accuracy
Adversarial attack

Human-imperceptible, Machine-recognizable Images

Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06
Watermarking
Privacy Enhancing Technology
Model Design and Accuracy

Machine Unlearning: A Survey

Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06
Watermarking
Membership Inference
Model Design and Accuracy

Adversarial attacks and defenses in explainable artificial intelligence: A survey

Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13
Membership Inference
Attack Method
Adversarial Example