Unified Breakdown Analysis for Byzantine Robust Gossip Authors: Renaud Gaucher, Aymeric Dieuleveut, Hadrien Hendrikx | Published: 2024-10-14 | Updated: 2025-02-03 FrameworkAttack Method 2024.10.14 2025.05.27 Literature Database
On Calibration of LLM-based Guard Models for Reliable Content Moderation Authors: Hongfu Liu, Hengguan Huang, Hao Wang, Xiangming Gu, Ye Wang | Published: 2024-10-14 LLM Performance EvaluationContent ModerationPrompt Injection 2024.10.14 2025.05.27 Literature Database
Feature Averaging: An Implicit Bias of Gradient Descent Leading to Non-Robustness in Neural Networks Authors: Binghui Li, Zhixuan Pan, Kaifeng Lyu, Jian Li | Published: 2024-10-14 Convergence AnalysisAdversarial Example 2024.10.14 2025.05.27 Literature Database
Yuan: Research on the Concept of Digital World Analogue Scientific Infrastructure and Science Popularization Communication Based on Suzhou Gardens Pattern Authors: Zhang Lvyang, Lu Wen, Zhao Yang, Li Jiaqi, Zhai Lidong | Published: 2024-10-14 Cybersecurity 2024.10.14 2025.05.27 Literature Database
Can LLMs be Scammed? A Baseline Measurement Study Authors: Udari Madhushani Sehwag, Kelly Patel, Francesca Mosca, Vineeth Ravi, Jessica Staddon | Published: 2024-10-14 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.10.14 2025.05.27 Literature Database
Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications Authors: Heng Xu, Tianqing Zhu, Wanlei Zhou | Published: 2024-10-14 Loss TermOptimization Problem 2024.10.14 2025.05.27 Literature Database
Survival of the Safest: Towards Secure Prompt Optimization through Interleaved Multi-Objective Evolution Authors: Ankita Sinha, Wendi Cui, Kamalika Das, Jiaxin Zhang | Published: 2024-10-12 Prompt InjectionMulti-Objective Prompt Optimization 2024.10.12 2025.05.27 Literature Database
Minimax rates of convergence for nonparametric regression under adversarial attacks Authors: Jingfu Peng, Yuhong Yang | Published: 2024-10-12 | Updated: 2025-05-13 Adversarial ExampleAdversarial Training 2024.10.12 2025.05.27 Literature Database
Can a large language model be a gaslighter? Authors: Wei Li, Luyao Zhu, Yang Song, Ruixi Lin, Rui Mao, Yang You | Published: 2024-10-11 Prompt InjectionSafety AlignmentAttack Method 2024.10.11 2025.05.27 Literature Database
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 Privacy ProtectionPrivacy Protection MethodPoisoning 2024.10.11 2025.05.27 Literature Database