Literature Database

Input Reconstruction Attack against Vertical Federated Large Language Models

Authors: Fei Zheng | Published: 2023-11-07 | Updated: 2023-11-24
Characteristics of VFL
Privacy Protection
Defense Method

SoK: Memorisation in machine learning

Authors: Dmitrii Usynin, Moritz Knolle, Georgios Kaissis | Published: 2023-11-06
Privacy Technique
Memory Evaluation
Deep Learning Method

ELEGANT: Certified Defense on the Fairness of Graph Neural Networks

Authors: Yushun Dong, Binchi Zhang, Hanghang Tong, Jundong Li | Published: 2023-11-05
Graph Neural Network
Bias Mitigation Techniques
Prompt Injection

Security Challenges in Autonomous Systems Design

Authors: Mohammad Hamad, Sebastian Steinhorst | Published: 2023-11-05 | Updated: 2023-12-04
Cybersecurity
Competitive Cooperative Systems
Automated Response to Attacks in Autonomous Systems

OverHear: Headphone based Multi-sensor Keystroke Inference

Authors: Raveen Wijewickrama, Maryam Abbasihafshejani, Anindya Maiti, Murtuza Jadliwala | Published: 2023-11-04
Framework
Headphone Usage
User Activity Analysis

Comprehensive Assessment of Toxicity in ChatGPT

Authors: Boyang Zhang, Xinyue Shen, Wai Man Si, Zeyang Sha, Zeyuan Chen, Ahmed Salem, Yun Shen, Michael Backes, Yang Zhang | Published: 2023-11-03
Abuse of AI Chatbots
Prompt Injection
Inappropriate Content Generation

Tensor Trust: Interpretable Prompt Injection Attacks from an Online Game

Authors: Sam Toyer, Olivia Watkins, Ethan Adrian Mendes, Justin Svegliato, Luke Bailey, Tiffany Wang, Isaac Ong, Karim Elmaaroufi, Pieter Abbeel, Trevor Darrell, Alan Ritter, Stuart Russell | Published: 2023-11-02
Prompt Injection
Prompt Engineering
Robustness Evaluation

Software Repositories and Machine Learning Research in Cyber Security

Authors: Mounika Vanamala, Keith Bryant, Alex Caravella | Published: 2023-11-01
Security Analysis
Software Security
Topic Modeling

Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes

Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01
Threats of Medical AI
Selection and Evaluation of Optimization Algorithms
Computational Efficiency

DEPN: Detecting and Editing Privacy Neurons in Pretrained Language Models

Authors: Xinwei Wu, Junzhuo Li, Minghui Xu, Weilong Dong, Shuangzhi Wu, Chao Bian, Deyi Xiong | Published: 2023-10-31 | Updated: 2023-12-05
Privacy Protection Method
Privacy Technique
Model editing techniques