A Systematic and Formal Study of the Impact of Local Differential Privacy on Fairness: Preliminary Results Authors: Karima Makhlouf, Tamara Stefanovic, Heber H. Arcolezi, Catuscia Palamidessi | Published: 2024-05-23 BiasPrivacy ProtectionPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
A Comprehensive Overview of Large Language Models (LLMs) for Cyber Defences: Opportunities and Directions Authors: Mohammed Hassanin, Nour Moustafa | Published: 2024-05-23 LLM SecurityCybersecurityPrompt Injection 2024.05.23 2025.05.27 Literature Database
Tighter Privacy Auditing of DP-SGD in the Hidden State Threat Model Authors: Tudor Cebere, Aurélien Bellet, Nicolas Papernot | Published: 2024-05-23 | Updated: 2024-10-14 Data Privacy AssessmentPrivacy Protection MethodMembership Inference 2024.05.23 2025.05.27 Literature Database
Evaluation of the Programming Skills of Large Language Models Authors: Luc Bryan Heitz, Joun Chamas, Christopher Scherb | Published: 2024-05-23 LLM Performance EvaluationCode GenerationData Collection 2024.05.23 2025.05.27 Literature Database
Federated Domain-Specific Knowledge Transfer on Large Language Models Using Synthetic Data Authors: Haoran Li, Xinyuan Zhao, Dadi Guo, Hanlin Gu, Ziqian Zeng, Yuxing Han, Yangqiu Song, Lixin Fan, Qiang Yang | Published: 2024-05-23 Few-Shot LearningDataset GenerationPrivacy Protection Method 2024.05.23 2025.05.27 Literature Database
S-Eval: Towards Automated and Comprehensive Safety Evaluation for Large Language Models Authors: Xiaohan Yuan, Jinfeng Li, Dongxia Wang, Yuefeng Chen, Xiaofeng Mao, Longtao Huang, Jialuo Chen, Hui Xue, Xiaoxia Liu, Wenhai Wang, Kui Ren, Jingyi Wang | Published: 2024-05-23 | Updated: 2025-04-07 Risk Analysis MethodLarge Language ModelSafety Alignment 2024.05.23 2025.05.27 Literature Database
Memory Scraping Attack on Xilinx FPGAs: Private Data Extraction from Terminated Processes Authors: Bharadwaj Madabhushi, Sandip Kundu, Daniel Holcomb | Published: 2024-05-22 FPGAWatermarkingMemory Management Method 2024.05.22 2025.05.27 Literature Database
Towards Certification of Uncertainty Calibration under Adversarial Attacks Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22 Evaluation MethodWatermark EvaluationDifficulty Calibration 2024.05.22 2025.05.27 Literature Database
Naturally Private Recommendations with Determinantal Point Processes Authors: Jack Fitzsimons, Agustín Freitas Pasqualini, Robert Pisarczyk, Dmitrii Usynin | Published: 2024-05-22 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.05.22 2025.05.27 Literature Database
WaterPool: A Watermark Mitigating Trade-offs among Imperceptibility, Efficacy and Robustness Authors: Baizhou Huang, Xiaojun Wan | Published: 2024-05-22 WatermarkingWatermark RobustnessWatermark Evaluation 2024.05.22 2025.05.27 Literature Database