PackVFL: Efficient HE Packing for Vertical Federated Learning Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01 2024.05.01 2025.05.12 Literature Database
Unleashing the Power of LLM to Infer State Machine from the Protocol Implementation Authors: Haiyang Wei, Ligeng Chen, Zhengjie Du, Yuhan Wu, Haohui Huang, Yue Liu, Guang Cheng, Fengyuan Xu, Linzhang Wang, Bing Mao | Published: 2024-05-01 | Updated: 2025-03-27 2024.05.01 2025.05.12 Literature Database
TuBA: Cross-Lingual Transferability of Backdoor Attacks in LLMs with Instruction Tuning Authors: Xuanli He, Jun Wang, Qiongkai Xu, Pasquale Minervini, Pontus Stenetorp, Benjamin I. P. Rubinstein, Trevor Cohn | Published: 2024-04-30 | Updated: 2025-03-17 2024.04.30 2025.05.12 Literature Database
Federated Graph Learning for EV Charging Demand Forecasting with Personalization Against Cyberattacks Authors: Yi Li, Renyou Xie, Chaojie Li, Yi Wang, Zhaoyang Dong | Published: 2024-04-30 2024.04.30 2025.05.12 Literature Database
Why You Should Not Trust Interpretations in Machine Learning: Adversarial Attacks on Partial Dependence Plots Authors: Xi Xin, Giles Hooker, Fei Huang | Published: 2024-04-29 | Updated: 2024-05-01 2024.04.29 2025.05.12 Literature Database
Evaluating and Mitigating Linguistic Discrimination in Large Language Models Authors: Guoliang Dong, Haoyu Wang, Jun Sun, Xinyu Wang | Published: 2024-04-29 | Updated: 2024-05-10 2024.04.29 2025.05.12 Literature Database
Exploring the Robustness of In-Context Learning with Noisy Labels Authors: Chen Cheng, Xinzhi Yu, Haodong Wen, Jingsong Sun, Guanzhang Yue, Yihao Zhang, Zeming Wei | Published: 2024-04-28 | Updated: 2024-05-01 2024.04.28 2025.05.12 Literature Database
Attacking Bayes: On the Adversarial Robustness of Bayesian Neural Networks Authors: Yunzhen Feng, Tim G. J. Rudner, Nikolaos Tsilivis, Julia Kempe | Published: 2024-04-27 2024.04.27 2025.05.12 Literature Database
Evaluations of Machine Learning Privacy Defenses are Misleading Authors: Michael Aerni, Jie Zhang, Florian Tramèr | Published: 2024-04-26 | Updated: 2024-09-05 2024.04.26 2025.05.12 Literature Database
Human-Imperceptible Retrieval Poisoning Attacks in LLM-Powered Applications Authors: Quan Zhang, Binqi Zeng, Chijin Zhou, Gwihwan Go, Heyuan Shi, Yu Jiang | Published: 2024-04-26 2024.04.26 2025.05.12 Literature Database