Literature Database

MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage

Authors: Ying Song, Balaji Palanisamy | Published: 2024-01-23 | Updated: 2025-01-26
Watermarking
Bias
Membership Inference

Wasserstein Differential Privacy

Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23
Watermarking
Privacy Protection Method
Watermark Evaluation

Text Embedding Inversion Security for Multilingual Language Models

Authors: Yiyi Chen, Heather Lent, Johannes Bjerva | Published: 2024-01-22 | Updated: 2024-06-05
Watermarking
Membership Inference
Model Performance Evaluation

PsySafe: A Comprehensive Framework for Psychological-based Attack, Defense, and Evaluation of Multi-agent System Safety

Authors: Zaibin Zhang, Yongting Zhang, Lijun Li, Hongzhi Gao, Lijun Wang, Huchuan Lu, Feng Zhao, Yu Qiao, Jing Shao | Published: 2024-01-22 | Updated: 2024-08-20
Prompt Injection
Safety Alignment
Psychological Manipulation

Unraveling Attacks in Machine Learning-based IoT Ecosystems: A Survey and the Open Libraries Behind Them

Authors: Chao Liu, Boxi Chen, Wei Shao, Chris Zhang, Kelvin Wong, Yi Zhang | Published: 2024-01-22 | Updated: 2024-01-27
Backdoor Attack
Privacy Protection Method
Membership Inference

Machine learning-based network intrusion detection for big and imbalanced data using oversampling, stacking feature embedding and feature extraction

Authors: Md. Alamin Talukder, Md. Manowarul Islam, Md Ashraf Uddin, Khondokar Fida Hasan, Selina Sharmin, Salem A. Alyami, Mohammad Ali Moni | Published: 2024-01-22
Watermarking
Model Performance Evaluation
Intrusion Detection System

Instructional Fingerprinting of Large Language Models

Authors: Jiashu Xu, Fei Wang, Mingyu Derek Ma, Pang Wei Koh, Chaowei Xiao, Muhao Chen | Published: 2024-01-21 | Updated: 2024-04-03
Watermarking
Fingerprinting Method
Model Performance Evaluation

Inducing High Energy-Latency of Large Vision-Language Models with Verbose Images

Authors: Kuofeng Gao, Yang Bai, Jindong Gu, Shu-Tao Xia, Philip Torr, Zhifeng Li, Wei Liu | Published: 2024-01-20 | Updated: 2024-03-22
Model DoS
Model Evaluation
Resource Scarcity Issues

BadChain: Backdoor Chain-of-Thought Prompting for Large Language Models

Authors: Zhen Xiang, Fengqing Jiang, Zidi Xiong, Bhaskar Ramasubramanian, Radha Poovendran, Bo Li | Published: 2024-01-20
LLM Performance Evaluation
Backdoor Attack
Prompt Injection

LLM4Fuzz: Guided Fuzzing of Smart Contracts with Large Language Models

Authors: Chaofan Shou, Jing Liu, Doudou Lu, Koushik Sen | Published: 2024-01-20
LLM Performance Evaluation
Smart Contract
Program Analysis