Feature Engineering-Based Detection of Buffer Overflow Vulnerability in Source Code Using Neural Networks Authors: Mst Shapna Akter, Hossain Shahriar, Juan Rodriguez Cardenas, Sheikh Iqbal Ahamed, Alfredo Cuzzocrea | Published: 2023-06-01 2023.06.01 2025.05.28 Literature Database
A Note On Interpreting Canary Exposure Authors: Matthew Jagielski | Published: 2023-05-31 | Updated: 2023-06-02 2023.05.31 2025.05.28 Literature Database
Deception by Omission: Using Adversarial Missingness to Poison Causal Structure Learning Authors: Deniz Koyuncu, Alex Gittens, Bülent Yener, Moti Yung | Published: 2023-05-31 2023.05.31 2025.05.28 Literature Database
Inferring Private Personal Attributes of Virtual Reality Users from Head and Hand Motion Data Authors: Vivek Nair, Christian Rack, Wenbo Guo, Rui Wang, Shuixian Li, Brandon Huang, Atticus Cull, James F. O'Brien, Marc Latoschik, Louis Rosenberg, Dawn Song | Published: 2023-05-30 | Updated: 2023-06-10 2023.05.30 2025.05.28 Literature Database
Robust Lipschitz Bandits to Adversarial Corruptions Authors: Yue Kang, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2023-05-29 | Updated: 2023-10-08 2023.05.29 2025.05.28 Literature Database
Direct Preference Optimization: Your Language Model is Secretly a Reward Model Authors: Rafael Rafailov, Archit Sharma, Eric Mitchell, Stefano Ermon, Christopher D. Manning, Chelsea Finn | Published: 2023-05-29 | Updated: 2024-07-29 2023.05.29 2025.05.28 Literature Database
Membership Inference Attacks against Language Models via Neighbourhood Comparison Authors: Justus Mattern, Fatemehsadat Mireshghallah, Zhijing Jin, Bernhard Schölkopf, Mrinmaya Sachan, Taylor Berg-Kirkpatrick | Published: 2023-05-29 | Updated: 2023-08-07 2023.05.29 2025.05.28 Literature Database
LLMs Can Understand Encrypted Prompt: Towards Privacy-Computing Friendly Transformers Authors: Xuanqi Liu, Zhuotao Liu | Published: 2023-05-28 | Updated: 2023-12-15 2023.05.28 2025.05.28 Literature Database
The Curse of Recursion: Training on Generated Data Makes Models Forget Authors: Ilia Shumailov, Zakhar Shumaylov, Yiren Zhao, Yarin Gal, Nicolas Papernot, Ross Anderson | Published: 2023-05-27 | Updated: 2024-04-14 2023.05.27 2025.05.28 Literature Database
Improved Privacy-Preserving PCA Using Optimized Homomorphic Matrix Multiplication Authors: Xirong Ma | Published: 2023-05-27 | Updated: 2023-08-17 2023.05.27 2025.05.28 Literature Database