Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 2024.07.02 2025.05.27 Literature Database
On Discrete Prompt Optimization for Diffusion Models Authors: Ruochen Wang, Ting Liu, Cho-Jui Hsieh, Boqing Gong | Published: 2024-06-27 2024.06.27 2025.05.27 Literature Database
Diffusion-based Adversarial Purification for Intrusion Detection Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25 2024.06.25 2025.05.27 Literature Database
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 2024.06.25 2025.05.27 Literature Database
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI Authors: Christopher Burger, Charles Walter, Thai Le | Published: 2024-06-22 | Updated: 2025-01-17 2024.06.22 2025.05.27 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 2024.06.20 2025.05.27 Literature Database
Let the Noise Speak: Harnessing Noise for a Unified Defense Against Adversarial and Backdoor Attacks Authors: Md Hasan Shahriar, Ning Wang, Naren Ramakrishnan, Y. Thomas Hou, Wenjing Lou | Published: 2024-06-18 | Updated: 2025-04-14 2024.06.18 2025.05.27 Literature Database
Data Plagiarism Index: Characterizing the Privacy Risk of Data-Copying in Tabular Generative Models Authors: Joshua Ward, Chi-Hua Wang, Guang Cheng | Published: 2024-06-18 2024.06.18 2025.05.27 Literature Database
Can Go AIs be adversarially robust? Authors: Tom Tseng, Euan McLean, Kellin Pelrine, Tony T. Wang, Adam Gleave | Published: 2024-06-18 | Updated: 2025-01-14 2024.06.18 2025.05.27 Literature Database
UIFV: Data Reconstruction Attack in Vertical Federated Learning Authors: Jirui Yang, Peng Chen, Zhihui Lu, Qiang Duan, Yubing Bao | Published: 2024-06-18 | Updated: 2025-01-14 2024.06.18 2025.05.27 Literature Database