Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization Authors: Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 2024.10.11 2025.05.27 Literature Database
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
MergePrint: Robust Fingerprinting against Merging Large Language Models Authors: Shojiro Yamabe, Tsubasa Takahashi, Futa Waseda, Koki Wataoka | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
SoK: Verifiable Cross-Silo FL Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11 2024.10.11 2025.05.27 Literature Database
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification Authors: Anthony Etim, Jakub Szefer | Published: 2024-10-10 2024.10.10 2025.05.27 Literature Database
Privately Learning from Graphs with Applications in Fine-tuning Large Language Models Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10 2024.10.10 2025.05.27 Literature Database
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 2024.10.10 2025.05.27 Literature Database