Literature Database

A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results

Authors: Karima Makhlouf, Tamara Stefanovic, Heber H. Arcolezi, Catuscia Palamidessi | Published: 2024-05-23
Bias
Privacy Protection
Privacy Protection Method

A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions

Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23
LLM Security
Cybersecurity
Prompt Injection

Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model

Authors: Tudor Cebere, Aurélien Bellet, Nicolas Papernot | Published: 2024-05-23 | Updated: 2024-10-14
Data Privacy Assessment
Privacy Protection Method
Membership Inference

Evaluation of the Programming Skills of Large Language Models

Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23
LLM Performance Evaluation
Code Generation
Data Collection

Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data

Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23
Few-Shot Learning
Dataset Generation
Privacy Protection Method

S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models

Authors: Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Jialuo Chen, Hui Xue, Xiaoxia Liu, Wenhai Wang, Kui Ren, Jingyi Wang | Published: 2024-05-23 | Updated: 2025-04-07
Risk Analysis Method
Large Language Model
Safety Alignment

Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes

Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22
FPGA
Watermarking
Memory Management Method

Towards Certification of Uncertainty Calibration under Adversarial Attacks

Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22
Evaluation Method
Watermark Evaluation
Difficulty Calibration

Naturally Private Recommendations with Determinantal Point Processes

Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22
Watermarking
Privacy Protection Method
Watermark Evaluation

WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness

Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22
Watermarking
Watermark Robustness
Watermark Evaluation