Literature Database

SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security

Authors: Zefang Liu | Published: 2023-12-26
LLM Performance Evaluation
Cybersecurity
Prompt Injection

An Empirical Study of Efficiency and Privacy of Federated Learning Algorithms

Authors: Sofia Zahri, Hajar Bennouri, Ahmed M. Abdelmoniem | Published: 2023-12-24
Privacy Protection
Privacy Protection Method
Federated Learning

SODA: Protecting Proprietary Information in On-Device Machine Learning Models

Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22
Watermarking
Privacy Protection Method
Membership Inference

Robustness, Efficiency, or Privacy: Pick Two in Machine Learning

Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11
Byzantine Resilience
Privacy Protection Method
Robustness Evaluation

ChatGPT, Llama, can you write my report? An experiment on assisted digital forensics reports written using (Local) Large Language Models

Authors: Gaëtan Michelet, Frank Breitinger | Published: 2023-12-22
Forensic Report
Prompt Injection

MetaAID 2.5: A Secure Framework for Developing Metaverse Applications via Large Language Models

Authors: Hongyin Zhu | Published: 2023-12-22
LLM Security
Data Generation
Prompt Injection

Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience

Authors: Janvi Thakkar, Giulio Zizzo, Sergio Maffeis | Published: 2023-12-21 | Updated: 2024-01-07
Watermarking
Hyperparameter Tuning
Adversarial Training

Rényi Pufferfish Privacy: General Additive Noise Mechanisms and Privacy Amplification by Iteration

Authors: Clément Pierquin, Aurélien Bellet, Marc Tommasi, Matthieu Boussard | Published: 2023-12-21 | Updated: 2024-06-10
Watermarking
Privacy Protection Method
Watermark Evaluation

An Approach to Abstract Multi-stage Cyberattack Data Generation for ML-Based IDS in Smart Grids

Authors: Ömer Sen, Philipp Malskorn, Simon Glomb, Immanuel Hacker, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Dataset Generation
Network Node Configuration

A Learning oriented DLP System based on Classification Model

Authors: Kishu Gupta, Ashwani Kush | Published: 2023-12-21
Data Protection Method
Data Preprocessing
Model Performance Evaluation