Redefining DDoS Attack Detection Using A Dual-Space Prototypical Network-Based Approach Authors: Fernando Martinez, Mariyam Mapkar, Ali Alfatemi, Mohamed Rahouti, Yufeng Xin, Kaiqi Xiong, Nasir Ghani | Published: 2024-06-04 DDoS Attack DetectionFew-Shot LearningPrototype Network 2024.06.04 2025.05.27 Literature Database
Safeguarding Large Language Models: A Survey Authors: Yi Dong, Ronghui Mu, Yanghao Zhang, Siqi Sun, Tianle Zhang, Changshun Wu, Gaojie Jin, Yi Qi, Jinwei Hu, Jie Meng, Saddek Bensalem, Xiaowei Huang | Published: 2024-06-03 LLM SecurityGuardrail MethodPrompt Injection 2024.06.03 2025.05.27 Literature Database
Model for Peanuts: Hijacking ML Models without Training Access is Possible Authors: Mahmoud Ghorbel, Halima Bouzidi, Ioan Marius Bilasco, Ihsen Alouani | Published: 2024-06-03 Membership InferenceAttack MethodFace Recognition System 2024.06.03 2025.05.27 Literature Database
Decoupled Alignment for Robust Plug-and-Play Adaptation Authors: Haozheng Luo, Jiahao Yu, Wenxin Zhang, Jialong Li, Jerry Yao-Chieh Hu, Xinyu Xing, Han Liu | Published: 2024-06-03 | Updated: 2024-06-06 LLM Performance EvaluationPrompt InjectionModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
Differentially Private Tabular Data Synthesis using Large Language Models Authors: Toan V. Tran, Li Xiong | Published: 2024-06-03 Dataset GenerationPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
PrivacyRestore: Privacy-Preserving Inference in Large Language Models via Privacy Removal and Restoration Authors: Ziqian Zeng, Jianwei Wang, Junyao Yang, Zhengdong Lu, Haoran Li, Huiping Zhuang, Cen Chen | Published: 2024-06-03 | Updated: 2025-05-28 LLM SecurityPrivacy ClassificationDifferential Privacy 2024.06.03 2025.05.30 Literature Database
BELLS: A Framework Towards Future Proof Benchmarks for the Evaluation of LLM Safeguards Authors: Diego Dorn, Alexandre Variengien, Charbel-Raphaël Segerie, Vincent Corruble | Published: 2024-06-03 LLM SecurityContent ModerationPrompt Injection 2024.06.03 2025.05.27 Literature Database
FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation Authors: Hanlin Gu, Jiahuan Luo, Yan Kang, Yuan Yao, Gongxi Zhu, Bowen Li, Lixin Fan, Qiang Yang | Published: 2024-06-03 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello | Published: 2024-06-03 WatermarkingBackdoor AttackPoisoning 2024.06.03 2025.05.27 Literature Database
Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients Authors: Weijun Li, Qiongkai Xu, Mark Dras | Published: 2024-06-03 | Updated: 2024-10-04 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.06.03 2025.05.27 Literature Database