System-level Analysis of Adversarial Attacks and Defenses on Intelligence in O-RAN based Cellular Networks

Authors: Azuka Chiejina, Brian Kim, Kaushik Chowhdury, Vijay K. Shah | Published: 2024-02-10 | Updated: 2024-02-13

Systematic Assessment of Tabular Data Synthesis Algorithms

Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13

RQP-SGD: Differential Private Machine Learning through Noisy SGD and Randomized Quantization

Authors: Ce Feng, Parv Venkitasubramaniam | Published: 2024-02-09

Trust the Process: Zero-Knowledge Machine Learning to Enhance Trust in Generative AI Interactions

Authors: Bianca-Mihaela Ganescu, Jonathan Passerat-Palmbach | Published: 2024-02-09

FedMIA: An Effective Membership Inference Attack Exploiting “All for One” Principle in Federated Learning

Authors: Gongxi Zhu, Donghao Li, Hanlin Gu, Yuan Yao, Lixin Fan, Yuxing Han | Published: 2024-02-09 | Updated: 2025-03-27

Barycentric and Pairwise Renyi Quantum Leakage

Authors: Farhad Farokhi | Published: 2024-02-09

EmojiPrompt: Generative Prompt Obfuscation for Privacy-Preserving Communication with Cloud-based LLMs

Authors: Sam Lin, Wenyue Hua, Zhenting Wang, Mingyu Jin, Lizhou Fan, Yongfeng Zhang | Published: 2024-02-08 | Updated: 2025-03-20

In-Context Learning Can Re-learn Forbidden Tasks

Authors: Sophie Xhonneux, David Dobre, Jian Tang, Gauthier Gidel, Dhanya Sridhar | Published: 2024-02-08

A High Dimensional Statistical Model for Adversarial Training: Geometry and Trade-Offs

Authors: Kasimir Tanner, Matteo Vilucchio, Bruno Loureiro, Florent Krzakala | Published: 2024-02-08 | Updated: 2024-12-27

Rapid Optimization for Jailbreaking LLMs via Subconscious Exploitation and Echopraxia

Authors: Guangyu Shen, Siyuan Cheng, Kaiyuan Zhang, Guanhong Tao, Shengwei An, Lu Yan, Zhuo Zhang, Shiqing Ma, Xiangyu Zhang | Published: 2024-02-08