Utilizing Large LanguageModels to Detect Privacy Leaks in Mini-App Code

Authors: Liming Jiang | Published: 2024-02-12

Differentially Private Training of Mixture of Experts Models

Authors: Pierre Tholoniat, Huseyin A. Inan, Janardhan Kulkarni, Robert Sim | Published: 2024-02-11

Blockchain Metrics and Indicators in Cryptocurrency Trading

Authors: Juan C. King, Roberto Dale, José M. Amigó | Published: 2024-02-11

MAGNETO: Edge AI for Human Activity Recognition — Privacy and Personalization

Authors: Jingwei Zuo, George Arvanitakis, Mthandazo Ndhlovu, Hakim Hacid | Published: 2024-02-11 | Updated: 2024-02-14

Sentinels of the Stream: Unleashing Large Language Models for Dynamic Packet Classification in Software Defined Networks — Position Paper

Authors: Shariq Murtuza | Published: 2024-02-10

System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13

Systematic Assessment of Tabular Data Synthesis Algorithms

Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13

RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization

Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09

Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions

Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09

FedMIA: An Effective Membership Inference Attack Exploiting “All for One” Principle in Federated Learning

Authors: Gongxi Zhu, Donghao Li, Hanlin Gu, Yuan Yao, Lixin Fan, Yuxing Han | Published: 2024-02-09 | Updated: 2025-03-27