Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications Authors: Heng Xu, Tianqing Zhu, Wanlei Zhou | Published: 2024-10-14 Loss TermOptimization Problem 2024.10.14 2025.05.12 Literature Database
Survival of the Safest: Towards Secure Prompt Optimization through Interleaved Multi-Objective Evolution Authors: Ankita Sinha, Wendi Cui, Kamalika Das, Jiaxin Zhang | Published: 2024-10-12 Prompt InjectionMulti-Objective Prompt Optimization 2024.10.12 2025.05.12 Literature Database
Minimax rates of convergence for nonparametric regression under adversarial attacks Authors: Jingfu Peng, Yuhong Yang | Published: 2024-10-12 Adversarial ExampleAdversarial Training 2024.10.12 2025.05.12 Literature Database
Can a large language model be a gaslighter? Authors: Wei Li, Luyao Zhu, Yang Song, Ruixi Lin, Rui Mao, Yang You | Published: 2024-10-11 Prompt InjectionSafety AlignmentAttack Method 2024.10.11 2025.05.12 Literature Database
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPoisoning 2024.10.11 2025.05.12 Literature Database
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization Authors: Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang | Published: 2024-10-11 LLM Performance EvaluationPrivacy Protection 2024.10.11 2025.05.12 Literature Database
PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11 LLM Performance EvaluationBackdoor AttackPoisoning 2024.10.11 2025.05.12 Literature Database
F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 Prompt InjectionAttack EvaluationAttack Method 2024.10.11 2025.05.12 Literature Database
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPrompt Injection 2024.10.11 2025.05.12 Literature Database
MergePrint: Robust Fingerprinting against Merging Large Language Models Authors: Shojiro Yamabe, Tsubasa Takahashi, Futa Waseda, Koki Wataoka | Published: 2024-10-11 Membership InferenceOptimization Problem 2024.10.11 2025.05.12 Literature Database