Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 2023.04.12 2025.05.28 Literature Database
RRHF: Rank Responses to Align Language Models with Human Feedback without tears Authors: Zheng Yuan, Hongyi Yuan, Chuanqi Tan, Wei Wang, Songfang Huang, Fei Huang | Published: 2023-04-11 | Updated: 2023-10-07 2023.04.11 2025.05.28 Literature Database
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 2023.04.11 2025.05.28 Literature Database
Multi-step Jailbreaking Privacy Attacks on ChatGPT Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01 2023.04.11 2025.05.28 Literature Database
RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11 2023.04.11 2025.05.28 Literature Database
Balancing Privacy and Performance for Private Federated Learning Algorithms Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18 2023.04.11 2025.05.28 Literature Database
Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10 2023.04.10 2025.05.28 Literature Database
Reinforcement Learning-Based Black-Box Model Inversion Attacks Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10 2023.04.10 2025.05.28 Literature Database
Ransomware Detection and Classification Strategies Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10 2023.04.10 2025.05.28 Literature Database
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06 2023.04.10 2025.05.28 Literature Database