Watermarking Vision-Language Pre-trained Models for Multi-modal Embedding as a Service Authors: Yuanmin Tang, Jing Yu, Keke Gai, Xiangyan Qu, Yue Hu, Gang Xiong, Qi Wu | Published: 2023-11-10 Data Privacy AssessmentMembership InferenceCopyright Trap 2023.11.10 2025.05.28 Literature Database
RAGLog: Log Anomaly Detection using Retrieval Augmented Generation Authors: Jonathan Pan, Swee Liang Wong, Yidi Yuan | Published: 2023-11-09 Clustering methodsClass ImbalanceChallenges of Log Analysis 2023.11.09 2025.05.28 Literature Database
DEMASQ: Unmasking the ChatGPT Wordsmith Authors: Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi | Published: 2023-11-08 Energy-Based ModelPrompt InjectionEvaluation Method 2023.11.08 2025.05.28 Literature Database
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection Authors: Akshit Jindal, Vikram Goyal, Saket Anand, Chetan Arora | Published: 2023-11-08 Data Selection StrategyMembership InferenceImprovement of Learning 2023.11.08 2025.05.28 Literature Database
CompactTag: Minimizing Computation Overheads in Actively-Secure MPC for Deep Neural Networks Authors: Yongqin Wang, Pratik Sarkar, Nishat Koti, Arpita Patra, Murali Annavaram | Published: 2023-11-08 Optimization MethodsDeep Learning MethodComputational Complexity 2023.11.08 2025.05.28 Literature Database
Stepping out of Flatland: Discovering Behavior Patterns as Topological Structures in Cyber Hypergraphs Authors: Helen Jenne, Sinan G. Aksoy, Daniel Best, Alyson Bittner, Gregory Henselman-Petrusek, Cliff Joslyn, Bill Kay, Audun Myers, Garret Seppala, Jackson Warley, Stephen J. Young, Emilie Purvine | Published: 2023-11-08 Topology AnalysisProperties of HypergraphsCommunication Analysis 2023.11.08 2025.05.28 Literature Database
Enhancing Malware Detection by Integrating Machine Learning with Cuckoo Sandbox Authors: Amaal F. Alshmarni, Mohammed A. Alliheedi | Published: 2023-11-07 Security AnalysisDataset GenerationDeep Learning Method 2023.11.07 2025.05.28 Literature Database
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29 Prompt InjectionExperimental ValidationAttack Method 2023.11.07 2025.05.28 Literature Database
Quantization-aware Neural Architectural Search for Intrusion Detection Authors: Rabin Yu Acharya, Laurens Le Jeune, Nele Mentens, Fatemeh Ganji, Domenic Forte | Published: 2023-11-07 | Updated: 2024-03-02 Improvement of LearningDeep Learning MethodQuantization and Privacy 2023.11.07 2025.05.28 Literature Database
Input Reconstruction Attack against Vertical Federated Large Language Models Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24 Characteristics of VFLPrivacy ProtectionDefense Method 2023.11.07 2025.05.28 Literature Database