System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13 2024.02.10 2025.05.12 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 2024.02.09 2025.05.12 Literature Database
RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09 2024.02.09 2025.05.12 Literature Database
Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09 2024.02.09 2025.05.12 Literature Database
FedMIA: An Effective Membership Inference Attack Exploiting “All for One” Principle in Federated Learning Authors: Gongxi Zhu, Donghao Li, Hanlin Gu, Yuan Yao, Lixin Fan, Yuxing Han | Published: 2024-02-09 | Updated: 2025-03-27 2024.02.09 2025.05.12 Literature Database
Barycentric and Pairwise Renyi Quantum Leakage Authors: Farhad Farokhi | Published: 2024-02-09 2024.02.09 2025.05.12 Literature Database
EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs Authors: Sam Lin, Wenyue Hua, Zhenting Wang, Mingyu Jin, Lizhou Fan, Yongfeng Zhang | Published: 2024-02-08 | Updated: 2025-03-20 2024.02.08 2025.05.12 Literature Database
In-Context Learning Can Re-learn Forbidden Tasks Authors: Sophie Xhonneux, David Dobre, Jian Tang, Gauthier Gidel, Dhanya Sridhar | Published: 2024-02-08 2024.02.08 2025.05.12 Literature Database
A High Dimensional Statistical Model for Adversarial Training: Geometry and Trade-Offs Authors: Kasimir Tanner, Matteo Vilucchio, Bruno Loureiro, Florent Krzakala | Published: 2024-02-08 | Updated: 2024-12-27 2024.02.08 2025.05.12 Literature Database
Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia Authors: Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang | Published: 2024-02-08 2024.02.08 2025.05.12 Literature Database