Literature Database

The Lipschitz-Variance-Margin Tradeoff for Enhanced Randomized Smoothing

Authors: Blaise Delattre, Alexandre Araujo, Quentin Barthélemy, Alexandre Allauzen | Published: 2023-09-28 | Updated: 2024-03-18
Watermarking
Trade-off Analysis
Stability of Predictions

A Primer on Bayesian Neural Networks: Review and Debates

Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28
Algorithm
Sampling Method
Model Selection

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06
Performance Evaluation
Traffic Correlation Attack
Defense Method

Watch Your Language: Investigating Content Moderation with Large Language Models

Authors: Deepak Kumar, Yousef AbuHashem, Zakir Durumeric | Published: 2023-09-25 | Updated: 2024-01-17
LLM Performance Evaluation
Prompt Injection
Inappropriate Content Generation

Byzantine-Resilient Federated PCA and Low Rank Column-wise Sensing

Authors: Ankit Pratap Singh, Namrata Vaswani | Published: 2023-09-25 | Updated: 2024-08-09
Poisoning
Dimensionality Reduction Method
Federated Learning

LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference

Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04
Watermarking
Performance Evaluation
Deep Learning Method

Can LLM-Generated Misinformation Be Detected?

Authors: Canyu Chen, Kai Shu | Published: 2023-09-25 | Updated: 2024-04-23
LLM Performance Evaluation
Prompt Injection
Inappropriate Content Generation

Unbiased Watermark for Large Language Models

Authors: Zhengmian Hu, Lichang Chen, Xidong Wu, Yihan Wu, Hongyang Zhang, Heng Huang | Published: 2023-09-22 | Updated: 2023-10-18
Watermarking
Model Performance Evaluation
Statistical Hypothesis Testing

The Reversal Curse: LLMs trained on “A is B” fail to learn “B is A”

Authors: Lukas Berglund, Meg Tong, Max Kaufmann, Mikita Balesni, Asa Cooper Stickland, Tomasz Korbak, Owain Evans | Published: 2023-09-21 | Updated: 2024-05-26
Hallucination
Model Evaluation
Bias in Training Data

Privacy-Preserving In-Context Learning with Differentially Private Few-Shot Generation

Authors: Xinyu Tang, Richard Shin, Huseyin A. Inan, Andre Manoel, Fatemehsadat Mireshghallah, Zinan Lin, Sivakanth Gopi, Janardhan Kulkarni, Robert Sim | Published: 2023-09-21 | Updated: 2024-01-28
Data Protection Method
Data Generation
Privacy Technique