Literature Database

Security Challenges in Autonomous Systems Design

Authors: Mohammad Hamad, Sebastian Steinhorst | Published: 2023-11-05 | Updated: 2023-12-04
Cybersecurity
Competitive Cooperative Systems
Automated Response to Attacks in Autonomous Systems

OverHear: Headphone based Multi-sensor Keystroke Inference

Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04
Framework
Headphone Usage
User Activity Analysis

Comprehensive Assessment of Toxicity in ChatGPT

Authors: Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang | Published: 2023-11-03
Abuse of AI Chatbots
Prompt Injection
Inappropriate Content Generation

Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game

Authors: Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong, Karim Elmaaroufi, Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell | Published: 2023-11-02
Prompt Injection
Prompt Engineering
Robustness Evaluation

Software Repositories and Machine Learning Research in Cyber Security

Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01
Security Analysis
Software Security
Topic Modeling

Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes

Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01
Threats of Medical AI
Selection and Evaluation of Optimization Algorithms
Computational Efficiency

DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models

Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05
Privacy Protection Method
Privacy Technique
Model editing techniques

Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy

Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01
Privacy Technique
Robustness Evaluation
Computational Efficiency

Security Challenges for Cloud or Fog Computing-Based AI Applications

Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20
Edge Computing
Security Analysis
Data Leakage

Balance, Imbalance, and Rebalance: Understanding Robust Overfitting from a Minimax Game Perspective

Authors: Yifei Wang, Liangchen Li, Jiansheng Yang, Zhouchen Lin, Yisen Wang | Published: 2023-10-30
Robustness Evaluation
Adversarial Training
Adaptive Adversarial Training