S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models

Authors: Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Jialuo Chen, Hui Xue, Xiaoxia Liu, Wenhai Wang, Kui Ren, Jingyi Wang | Published: 2024-05-23 | Updated: 2025-04-07

Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22

Towards Certification of Uncertainty Calibration under Adversarial Attacks

Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22

Naturally Private Recommendations with Determinantal Point Processes

Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22

WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness

Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22

A novel reliability attack of Physical Unclonable Functions

Authors: Gaoxiang Li, Yu Zhuang | Published: 2024-05-21 | Updated: 2024-06-07

Generative AI in Cybersecurity: A Comprehensive Review of LLM Applications and Vulnerabilities

Authors: Mohamed Amine Ferrag, Fatima Alwahedi, Ammar Battah, Bilel Cherif, Abdechakour Mechri, Norbert Tihanyi, Tamas Bisztray, Merouane Debbah | Published: 2024-05-21 | Updated: 2025-01-17

Uncertainty quantification by block bootstrap for differentially private stochastic gradient descent

Authors: Holger Dette, Carina Graw | Published: 2024-05-21

Self-HWDebug: Automation of LLM Self-Instructing for Hardware Security Verification

Authors: Mohammad Akyash, Hadi Mardani Kamali | Published: 2024-05-20

Practical Performance of a Distributed Processing Framework for Machine-Learning-based NIDS

Authors: Maho Kajiura, Junya Nakamura | Published: 2024-05-20