Adaptive Attack Detection in Text Classification: Leveraging Space Exploration Features for Text Sentiment Classification Authors: Atefeh Mahdavi, Neda Keivandarian, Marco Carvalho | Published: 2023-08-29 Text Generation MethodAdversarial TrainingAdaptive Misuse Detection 2023.08.29 2025.05.28 Literature Database
On the Steganographic Capacity of Selected Learning Models Authors: Rishit Agrawal, Kelvin Jou, Tanush Obili, Daksh Parikh, Samarth Prajapati, Yash Seth, Charan Sridhar, Nathan Zhang, Mark Stamp | Published: 2023-08-29 Data GenerationMachine Learning MethodWatermark Robustness 2023.08.29 2025.05.28 Literature Database
Gender bias and stereotypes in Large Language Models Authors: Hadas Kotek, Rikker Dockum, David Q. Sun | Published: 2023-08-28 Bias Detection in AI OutputAlgorithm FairnessLarge Language Model 2023.08.28 2025.05.28 Literature Database
Generating tabular datasets under differential privacy Authors: Gianluca Truda | Published: 2023-08-28 Data GenerationPrivacy ProtectionPrivacy Protection Method 2023.08.28 2025.05.28 Literature Database
Are Existing Out-Of-Distribution Techniques Suitable for Network Intrusion Detection? Authors: Andrea Corsini, Shanchieh Jay Yang | Published: 2023-08-28 Out-of-Distribution DetectionUnknown Attack DetectionMachine Learning Method 2023.08.28 2025.05.28 Literature Database
Detecting Language Model Attacks with Perplexity Authors: Gabriel Alon, Michael Kamfonas | Published: 2023-08-27 | Updated: 2023-11-07 LLM SecurityPrompt InjectionMalicious Prompt 2023.08.27 2025.05.28 Literature Database
LMSanitator: Defending Prompt-Tuning Against Task-Agnostic Backdoors Authors: Chengkun Wei, Wenlong Meng, Zhikun Zhang, Min Chen, Minghu Zhao, Wenjing Fang, Lei Wang, Zihui Zhang, Wenzhi Chen | Published: 2023-08-26 | Updated: 2023-10-14 Trigger DetectionBackdoor DetectionAttack Method 2023.08.26 2025.05.28 Literature Database
Uncovering Promises and Challenges of Federated Learning to Detect Cardiovascular Diseases: A Scoping Literature Review Authors: Sricharan Donkada, Seyedamin Pouriyeh, Reza M. Parizi, Meng Han, Nasrin Dehbozorgi, Nazmus Sakib, Quan Z. Sheng | Published: 2023-08-26 Smart HealthcareThreats of Medical AIFederated Learning 2023.08.26 2025.05.28 Literature Database
Active learning for fast and slow modeling attacks on Arbiter PUFs Authors: Vincent Dumoulin, Wenjing Rao, Natasha Devroye | Published: 2023-08-25 Evaluation Methods for PUFActive LearningMachine Learning Method 2023.08.25 2025.05.28 Literature Database
ZeroLeak: Using LLMs for Scalable and Cost Effective Side-Channel Patching Authors: M. Caner Tol, Berk Sunar | Published: 2023-08-24 LLM SecurityVulnerability Mitigation TechniqueWatermark Robustness 2023.08.24 2025.05.28 Literature Database