Literature Database

IoT Device Labeling Using Large Language Models

Authors: Bar Meyuhas, Anat Bremler-Barr, Tal Shapira | Published: 2024-03-03
IoT Device Identification
Data Collection
Label

Enhancing Data Provenance and Model Transparency in Federated Learning Systems — A Database Approach

Authors: Michael Gu, Ramasoumya Naraparaju, Dongfang Zhao | Published: 2024-03-03
Data Origins and Evolution
Poisoning
Federated Learning

Analysis of Privacy Leakage in Federated Large Language Models

Authors: Minh N. Vu, Truc Nguyen, Tre' R. Jeter, My T. Thai | Published: 2024-03-02
Privacy Protection Method
Poisoning
Federated Learning

A Photonic Physically Unclonable Function’s Resilience to Multiple-Valued Machine Learning Attacks

Authors: Jessie M. Henderson, Elena R. Henderson, Clayton A. Harper, Hiva Shahoei, William V. Oxford, Eric C. Larson, Duncan L. MacFarlane, Mitchell A. Thornton | Published: 2024-03-02
Watermarking
Model Performance Evaluation
Machine Learning Method

Employing LLMs for Incident Response Planning and Review

Authors: Sam Hays, Jules White | Published: 2024-03-02
Incident Response Plan
Cybersecurity
Risk Management

Defending Against Data Reconstruction Attacks in Federated Learning: An Information Theory Approach

Authors: Qi Tan, Qi Li, Yi Zhao, Zhuotao Liu, Xiaobing Guo, Ke Xu | Published: 2024-03-02
Privacy Protection Method
Poisoning
Federated Learning

AutoAttacker: A Large Language Model Guided System to Implement Automatic Cyber-attacks

Authors: Jiacen Xu, Jack W. Stokes, Geoff McDonald, Xuesong Bai, David Marshall, Siyue Wang, Adith Swaminathan, Zhou Li | Published: 2024-03-02
LLM Security
Prompt Injection
Attack Method

BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs)

Authors: Sean Wellington | Published: 2024-03-01
Privacy Protection
Resource optimization
Decentralized LLM Architecture

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01
Security Analysis
Poisoning
Transfer Learning

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05
Data Generation
Privacy Protection Method
Model Performance Evaluation