Dynamic Byzantine-Robust Learning: Adapting to Switching Byzantine Workers Authors: Ron Dorfman, Naseem Yehya, Kfir Y. Levy | Published: 2024-02-05 | Updated: 2024-06-16 Methods to Address Dynamic Byzantine BehaviorDynamic Byzantine BehaviorConvergence Property 2024.02.05 2025.05.27 Literature Database
Machine Learning Resistant Amorphous Silicon Physically Unclonable Functions (PUFs) Authors: Velat Kilic, Neil Macfarlane, Jasper Stround, Samuel Metais, Milad Alemohammad, A. Brinton Cooper, Amy C. Foster, Mark A. Foster | Published: 2024-02-05 Evaluation Methods for PUFDeep Learning MethodLinear Regression 2024.02.05 2025.05.27 Literature Database
Evading Data Contamination Detection for Language Models is (too) Easy Authors: Jasper Dekoninck, Mark Niklas Müller, Maximilian Baader, Marc Fischer, Martin Vechev | Published: 2024-02-05 | Updated: 2024-02-12 Data ObfuscationData Contamination DetectionClassification of Malicious Actors 2024.02.05 2025.05.27 Literature Database
Adversarial Text Purification: A Large Language Model Approach for Defense Authors: Raha Moraffah, Shubh Khandelwal, Amrita Bhattacharjee, Huan Liu | Published: 2024-02-05 Text Generation MethodPrompt InjectionAdversarial Text Purification 2024.02.05 2025.05.27 Literature Database
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 Model Performance EvaluationWatermark EvaluationTransparency and Verification 2024.02.05 2025.05.27 Literature Database
Estimation of conditional average treatment effects on distributed confidential data Authors: Yuji Kawamata, Ryoki Motai, Yukihiko Okada, Akira Imakura, Tetsuya Sakurai | Published: 2024-02-05 | Updated: 2024-09-10 WatermarkingSimulation Result EvaluationData Generation 2024.02.05 2025.05.27 Literature Database
UniTSyn: A Large-Scale Dataset Capable of Enhancing the Prowess of Large Language Models for Program Testing Authors: Yifeng He, Jiabo Huang, Yuyang Rong, Yiwen Guo, Ethan Wang, Hao Chen | Published: 2024-02-04 Code GenerationDataset GenerationTest Prioritization 2024.02.04 2025.05.27 Literature Database
Dynamic Incremental Optimization for Best Subset Selection Authors: Shaogang Ren, Xiaoning Qian | Published: 2024-02-04 | Updated: 2024-12-30 AlgorithmSparse ModelOptimization Methods 2024.02.04 2025.05.27 Literature Database
Jailbreaking Attack against Multimodal Large Language Model Authors: Zhenxing Niu, Haodong Ren, Xinbo Gao, Gang Hua, Rong Jin | Published: 2024-02-04 Prompt InjectionMalicious Content GenerationInformation Gathering Methods 2024.02.04 2025.05.27 Literature Database
A Review and Comparison of AI Enhanced Side Channel Analysis Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03 WatermarkingCybersecurityDeep Learning Method 2024.02.03 2025.05.27 Literature Database