Differentially Private Selection from Secure Distributed Computing Authors: Ivan Damgård, Hannah Keller, Boel Nelson, Claudio Orlandi, Rasmus Pagh | Published: 2023-06-07 | Updated: 2023-06-08 MPC AlgorithmScalability AnalysisPrivacy Enhancing Technology 2023.06.07 2025.05.28 Literature Database
Hardness of Deceptive Certificate Selection Authors: Stephan Wäldchen | Published: 2023-06-07 WatermarkingFeature Selection MethodCertificate Ratio 2023.06.07 2025.05.28 Literature Database
IsoEx: an explainable unsupervised approach to process event logs cyber investigation Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21 AlgorithmChallenges of Log AnalysisFeature Extraction Method 2023.06.07 2025.05.28 Literature Database
On the Detectability of ChatGPT Content: Benchmarking, Methodology, and Evaluation through the Lens of Academic Writing Authors: Zeyan Liu, Zijun Yao, Fengjun Li, Bo Luo | Published: 2023-06-07 | Updated: 2024-03-18 LLM ApplicationPrompt InjectionLiterature List 2023.06.07 2025.05.28 Literature Database
Extracting Cloud-based Model with Prior Knowledge Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13 Backdoor AttackAttack EvaluationAdversarial attack 2023.06.07 2025.05.28 Literature Database
Knowledge-Augmented Language Model Prompting for Zero-Shot Knowledge Graph Question Answering Authors: Jinheon Baek, Alham Fikri Aji, Amir Saffari | Published: 2023-06-07 RAGMovie CastKnowledge Graph 2023.06.07 2025.05.28 Literature Database
Exploring Model Dynamics for Accumulative Poisoning Discovery Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06 Backdoor AttackModel Design and AccuracyAdversarial attack 2023.06.06 2025.05.28 Literature Database
Human-imperceptible, Machine-recognizable Images Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06 WatermarkingPrivacy Enhancing TechnologyModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
Machine Unlearning: A Survey Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06 WatermarkingMembership InferenceModel Design and Accuracy 2023.06.06 2025.05.28 Literature Database
Adversarial attacks and defenses in explainable artificial intelligence: A survey Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13 Membership InferenceAttack MethodAdversarial Example 2023.06.06 2025.05.28 Literature Database