Watermarking Decision Tree Ensembles Authors: Stefano Calzavara, Lorenzo Cazzaro, Donald Gera, Salvatore Orlando | Published: 2024-10-06 WatermarkingCybersecurityWatermark Evaluation 2024.10.06 2025.05.12 Literature Database
TA3: Testing Against Adversarial Attacks on Machine Learning Models Authors: Yuanzhe Jin, Min Chen | Published: 2024-10-06 Attack Evaluation 2024.10.06 2025.05.12 Literature Database
A Large-Scale Exploit Instrumentation Study of AI/ML Supply Chain Attacks in Hugging Face Models Authors: Beatrice Casey, Joanna C. S. Santos, Mehdi Mirakhorli | Published: 2024-10-06 CybersecurityBackdoor Attack 2024.10.06 2025.05.12 Literature Database
Enhancing Android Malware Detection: The Influence of ChatGPT on Decision-centric Task Authors: Yao Li, Sen Fang, Tao Zhang, Haipeng Cai | Published: 2024-10-06 Prompt InjectionMalware Classification 2024.10.06 2025.05.12 Literature Database
OD-Stega: LLM-Based Near-Imperceptible Steganography via Optimized Distributions Authors: Yu-Shin Huang, Peter Just, Krishna Narayanan, Chao Tian | Published: 2024-10-06 Text Generation MethodOptimization Problem 2024.10.06 2025.05.12 Literature Database
Taylor Unswift: Secured Weight Release for Large Language Models via Taylor Expansion Authors: Guanchu Wang, Yu-Neng Chuang, Ruixiang Tang, Shaochen Zhong, Jiayi Yuan, Hongye Jin, Zirui Liu, Vipin Chaudhary, Shuai Xu, James Caverlee, Xia Hu | Published: 2024-10-06 LLM SecurityCryptography 2024.10.06 2025.05.12 Literature Database
Harnessing Task Overload for Scalable Jailbreak Attacks on Large Language Models Authors: Yiting Dong, Guobin Shen, Dongcheng Zhao, Xiang He, Yi Zeng | Published: 2024-10-05 LLM SecurityPrompt InjectionAttack Method 2024.10.05 2025.05.12 Literature Database
DiDOTS: Knowledge Distillation from Large-Language-Models for Dementia Obfuscation in Transcribed Speech Authors: Dominika Woszczyk, Soteris Demetriou | Published: 2024-10-05 LLM Performance EvaluationPrivacy Protection 2024.10.05 2025.05.12 Literature Database
pFedGame — Decentralized Federated Learning using Game Theory in Dynamic Topology Authors: Monik Raj Behera, Suchetana Chakraborty | Published: 2024-10-05 Simulation Result EvaluationPrivacy Protection 2024.10.05 2025.05.12 Literature Database
ASPIRER: Bypassing System Prompts With Permutation-based Backdoors in LLMs Authors: Lu Yan, Siyuan Cheng, Xuan Chen, Kaiyuan Zhang, Guangyu Shen, Zhuo Zhang, Xiangyu Zhang | Published: 2024-10-05 Negative TrainingBackdoor AttackPrompt Injection 2024.10.05 2025.05.12 Literature Database