Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15 Data CollectionModel Performance EvaluationVulnerability Prediction 2023.02.27 2025.05.28 Literature Database
From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12 Privacy Enhancing TechnologyConvergence AnalysisFixed Point Iteration Method 2023.02.24 2025.05.28 Literature Database
Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02 WatermarkingSoftware SecurityVulnerability Analysis 2023.02.24 2025.05.28 Literature Database
On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23 DNN IP Protection MethodWatermarkingModel Performance Evaluation 2023.02.23 2025.05.28 Literature Database
Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz | Published: 2023-02-23 | Updated: 2023-05-05 Indirect Prompt InjectionPrompt InjectionMalicious Prompt 2023.02.23 2025.05.28 Literature Database
PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06 DNN IP Protection MethodWatermarkingVulnerability detection 2023.02.22 2025.05.28 Literature Database
MultiRobustBench: Benchmarking Robustness Against Multiple Attacks Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20 DNN IP Protection MethodPoisoningModel Performance Evaluation 2023.02.21 2025.05.28 Literature Database
Generalization Bounds for Adversarial Contrastive Learning Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21 WatermarkingModel Performance EvaluationAdversarial Example 2023.02.21 2025.05.28 Literature Database
Poisoning Web-Scale Training Datasets is Practical Authors: Nicholas Carlini, Matthew Jagielski, Christopher A. Choquette-Choo, Daniel Paleka, Will Pearce, Hyrum Anderson, Andreas Terzis, Kurt Thomas, Florian Tramèr | Published: 2023-02-20 | Updated: 2024-05-06 PoisoningAttack Scenario AnalysisAdversarial attack 2023.02.20 2025.05.28 Literature Database
WW-FL: Secure and Private Large-Scale Federated Learning Authors: Felix Marx, Thomas Schneider, Ajith Suresh, Tobias Wehrle, Christian Weinert, Hossein Yalame | Published: 2023-02-20 | Updated: 2025-10-14 Trigger DetectionPrivacy Enhancing TechnologyPoisoning 2023.02.20 2025.10.16 Literature Database