Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11 Privacy Protection MethodLoss FunctionOptimization Problem 2024.07.05 2025.05.27 Literature Database
A Geometric Framework for Adversarial Vulnerability in Machine Learning Authors: Brian Bell | Published: 2024-07-03 PoisoningAdversarial ExampleLiterature List 2024.07.03 2025.05.27 Literature Database
Early-Stage Anomaly Detection: A Study of Model Performance on Complete vs. Partial Flows Authors: Adrian Pekar, Richard Jozsa | Published: 2024-07-03 | Updated: 2025-06-30 トラフィック分類Intrusion Detection SystemPerformance Evaluation Metrics 2024.07.03 2025.07.02 Literature Database
From Theft to Bomb-Making: The Ripple Effect of Unlearning in Defending Against Jailbreak Attacks Authors: Zhexin Zhang, Junxiao Yang, Yida Lu, Pei Ke, Shiyao Cui, Chujie Zheng, Hongning Wang, Minlie Huang | Published: 2024-07-03 | Updated: 2025-05-20 Prompt InjectionLarge Language Model法執行回避 2024.07.03 2025.05.28 Literature Database
MALT Powers Up Adversarial Attacks Authors: Odelia Melamed, Gilad Yehudai, Adi Shamir | Published: 2024-07-02 Mesoscopic LinearityAttack MethodEvaluation Method 2024.07.02 2025.05.27 Literature Database
Attack-Aware Noise Calibration for Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07 Privacy ProtectionPrivacy Protection MethodComputational Efficiency 2024.07.02 2025.05.27 Literature Database
On Discrete Prompt Optimization for Diffusion Models Authors: Ruochen Wang, Ting Liu, Cho-Jui Hsieh, Boqing Gong | Published: 2024-06-27 WatermarkingPrompt InjectionPrompt Engineering 2024.06.27 2025.05.27 Literature Database
Diffusion-based Adversarial Purification for Intrusion Detection Authors: Mohamed Amine Merzouk, Erwan Beurier, Reda Yaich, Nora Boulahia-Cuppens, Frédéric Cuppens | Published: 2024-06-25 Data PreprocessingAdversarial TrainingAutomated Intrusion Detection System 2024.06.25 2025.05.27 Literature Database
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 Trust Evaluation ModuleEvaluation MethodWatermark Evaluation 2024.06.25 2025.05.27 Literature Database
The Effect of Similarity Measures on Accurate Stability Estimates for Local Surrogate Models in Text-based Explainable AI Authors: Christopher Burger, Charles Walter, Thai Le | Published: 2024-06-22 | Updated: 2025-01-17 Adversarial ExampleEvaluation MethodSimilarity Measurement 2024.06.22 2025.05.27 Literature Database