AGIR: Automating Cyber Threat Intelligence Reporting with Natural Language Generation Authors: Filippo Perrina, Francesco Marchiori, Mauro Conti, Nino Vincenzo Verde | Published: 2023-10-04 2023.10.04 2025.05.28 Literature Database
Practical, Private Assurance of the Value of Collaboration via Fully Homomorphic Encryption Authors: Hassan Jameel Asghar, Zhigang Lu, Zhongrui Zhao, Dali Kaafar | Published: 2023-10-04 | Updated: 2024-10-07 2023.10.04 2025.05.28 Literature Database
zkFL: Zero-Knowledge Proof-based Gradient Aggregation for Federated Learning Authors: Zhipeng Wang, Nanqing Dong, Jiahao Sun, William Knottenbelt, Yike Guo | Published: 2023-10-04 | Updated: 2024-05-10 2023.10.04 2025.05.28 Literature Database
Low-Resource Languages Jailbreak GPT-4 Authors: Zheng-Xin Yong, Cristina Menghini, Stephen H. Bach | Published: 2023-10-03 | Updated: 2024-01-27 2023.10.03 2025.05.28 Literature Database
Jailbreaker in Jail: Moving Target Defense for Large Language Models Authors: Bocheng Chen, Advait Paliwal, Qiben Yan | Published: 2023-10-03 2023.10.03 2025.05.28 Literature Database
FLEDGE: Ledger-based Federated Learning Resilient to Inference and Backdoor Attacks Authors: Jorge Castillo, Phillip Rieger, Hossein Fereidooni, Qian Chen, Ahmad Sadeghi | Published: 2023-10-03 2023.10.03 2025.05.28 Literature Database
Beyond Labeling Oracles: What does it mean to steal ML models? Authors: Avital Shafran, Ilia Shumailov, Murat A. Erdogdu, Nicolas Papernot | Published: 2023-10-03 | Updated: 2024-06-13 2023.10.03 2025.05.28 Literature Database
5G Network Slicing: Analysis of Multiple Machine Learning Classifiers Authors: Mirsad Malkoc, Hisham A. Kholidy | Published: 2023-10-03 2023.10.03 2025.05.28 Literature Database
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused? Authors: Hangfan Zhang, Zhimeng Guo, Huaisheng Zhu, Bochuan Cao, Lu Lin, Jinyuan Jia, Jinghui Chen, Dinghao Wu | Published: 2023-10-02 2023.10.02 2025.05.28 Literature Database
LLM Lies: Hallucinations are not Bugs, but Features as Adversarial Examples Authors: Jia-Yu Yao, Kun-Peng Ning, Zhen-Hui Liu, Mu-Nan Ning, Yu-Yang Liu, Li Yuan | Published: 2023-10-02 | Updated: 2024-08-04 2023.10.02 2025.05.28 Literature Database