Watch Out for Your Guidance on Generation! Exploring Conditional Backdoor Attacks against Large Language Models Authors: Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li | Published: 2024-04-23 | Updated: 2025-01-08 2024.04.23 2025.05.12 Literature Database
A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation Authors: Phoebe Jing, Yijing Gao, Xianlong Zeng | Published: 2024-04-23 2024.04.23 2025.05.12 Literature Database
Chain of trust: Unraveling references among Common Criteria certified products Authors: Adam Janovsky, Łukasz Chmielewski, Petr Svenda, Jan Jancar, Vashek Matyas | Published: 2024-04-22 | Updated: 2024-08-19 2024.04.22 2025.05.12 Literature Database
Protecting Your LLMs with Information Bottleneck Authors: Zichuan Liu, Zefan Wang, Linjie Xu, Jinyu Wang, Lei Song, Tianchun Wang, Chunlin Chen, Wei Cheng, Jiang Bian | Published: 2024-04-22 | Updated: 2024-10-10 2024.04.22 2025.05.12 Literature Database
Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs Authors: Javier Rando, Francesco Croce, Kryštof Mitka, Stepan Shabalin, Maksym Andriushchenko, Nicolas Flammarion, Florian Tramèr | Published: 2024-04-22 | Updated: 2024-06-06 2024.04.22 2025.05.12 Literature Database
AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs Authors: Anselm Paulus, Arman Zharmagambetov, Chuan Guo, Brandon Amos, Yuandong Tian | Published: 2024-04-21 2024.04.21 2025.05.12 Literature Database
Reliable Model Watermarking: Defending Against Theft without Compromising on Evasion Authors: Hongyu Zhu, Sichu Liang, Wentao Hu, Fangqi Li, Ju Jia, Shilin Wang | Published: 2024-04-21 2024.04.21 2025.05.12 Literature Database
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud Authors: Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang | Published: 2024-04-20 2024.04.20 2025.05.12 Literature Database
Evaluating the Effectiveness of LLMs in Introductory Computer Science Education: A Semester-Long Field Study Authors: Wenhan Lyu, Yimeng Wang, Tingting, Chung, Yifan Sun, Yixuan Zhang | Published: 2024-04-20 | Updated: 2024-05-03 2024.04.20 2025.05.12 Literature Database
Intrusion Detection at Scale with the Assistance of a Command-line Language Model Authors: Jiongliang Lin, Yiwen Guo, Hao Chen | Published: 2024-04-20 2024.04.20 2025.05.12 Literature Database