Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 WatermarkingPrivacy AnalysisPrivacy Technique 2023.04.11 2025.05.28 Literature Database
Multi-step Jailbreaking Privacy Attacks on ChatGPT Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01 LLM SecurityPrivacy AnalysisPrompt Injection 2023.04.11 2025.05.28 Literature Database
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11 Trade-off AnalysisPrivacy TechniquePoisoning 2023.04.11 2025.05.28 Literature Database
Balancing Privacy and Performance for Private Federated Learning Algorithms Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18 Privacy TechniquePoisoningOptimization Methods 2023.04.11 2025.05.28 Literature Database
Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10 DNN IP Protection MethodUncertainty MapSelf-Attention Mechanism 2023.04.10 2025.05.28 Literature Database
Reinforcement Learning-Based Black-Box Model Inversion Attacks Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10 DNN IP Protection MethodPrivacy TechniqueChallenges of Generative Models 2023.04.10 2025.05.28 Literature Database
Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 Network Threat DetectionMalware Detection MethodMachine Learning Technology 2023.04.10 2025.05.28 Literature Database
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06 Prompt InjectionExperimental ValidationAttack Evaluation 2023.04.10 2025.05.28 Literature Database
Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21 Client ClusteringPrivacy TechniqueOptimization Problem 2023.04.09 2025.05.28 Literature Database
KeyDetect –Detection of anomalies and user based on Keystroke Dynamics Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08 Security AnalysisPerformance EvaluationMachine Learning Technology 2023.04.08 2025.05.28 Literature Database