Literature Database

Recovering from Privacy-Preserving Masking with Large Language Models

Authors: Arpita Vats, Zhe Liu, Peng Su, Debjyoti Paul, Yingyi Ma, Yutong Pang, Zeeshan Ahmed, Ozlem Kalinli | Published: 2023-09-12 | Updated: 2023-12-14
LLM Performance Evaluation
Data Protection Method
Privacy Technique

SABLE: Secure And Byzantine robust LEarning

Authors: Antoine Choffrut, Rachid Guerraoui, Rafael Pinot, Renaud Sirdey, John Stephan, Martin Zuber | Published: 2023-09-11 | Updated: 2023-12-14
Watermarking
Byzantine Resilience
Privacy Protection Method

FuzzLLM: A Novel and Universal Fuzzing Framework for Proactively Discovering Jailbreak Vulnerabilities in Large Language Models

Authors: Dongyu Yao, Jianshu Zhang, Ian G. Harris, Marcel Carlsson | Published: 2023-09-11 | Updated: 2024-04-14
LLM Security
Watermarking
Prompt Injection

Quantifying and Attributing the Hallucination of Large Language Models via Association Analysis

Authors: Li Du, Yequan Wang, Xingrun Xing, Yiqun Ya, Xiang Li, Xin Jiang, Xuezhi Fang | Published: 2023-09-11
Detection of Hallucinations
Role of Artificial Intelligence
Digital Watermarking for Generative AI

Outlier Robust Adversarial Training

Authors: Shu Hu, Zhenhuan Yang, Xin Wang, Yiming Ying, Siwei Lyu | Published: 2023-09-10
Convergence Property
Loss Term
Adversarial attack

DAD++: Improved Data-free Test Time Adversarial Defense

Authors: Gaurav Kumar Nayak, Inder Khatri, Shubham Randive, Ruchit Rawal, Anirban Chakraborty | Published: 2023-09-10
Adversarial Example
Adversarial attack
Defense Method

Classification of Spam URLs Using Machine Learning Approaches

Authors: Omar Husni Odeh, Anas Arram, Murad Njoum | Published: 2023-09-10 | Updated: 2023-12-03
Spam Detection
Literature List
Machine Learning Method

Bicoptor 2.0: Addressing Challenges in Probabilistic Truncation for Enhanced Privacy-Preserving Machine Learning

Authors: Lijing Zhou, Qingrui Song, Su Zhang, Ziyu Wang, Xianggui Wang, Yong Li | Published: 2023-09-10 | Updated: 2024-03-06
MPC Algorithm
Multi-Party Computation
Reduction of Communication Costs

Compact: Approximating Complex Activation Functions for Secure Computation

Authors: Mazharul Islam, Sunpreet S. Arora, Rahul Chatterjee, Peter Rindal, Maliheh Shirvanian | Published: 2023-09-09 | Updated: 2024-03-17
MPC Algorithm
Multi-Party Computation
Machine Learning Technology

Adversarially Robust Deep Learning with Optimal-Transport-Regularized Divergences

Authors: Jeremiah Birrell, Mohammadreza Ebrahimi | Published: 2023-09-07
Malicious Demo Construction
Adversarial attack
Defense Method