Literature Database

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04
Data Leakage
Privacy Violation
Prompting Strategy

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04
Algorithm Design
Dataset Generation
Data Obfuscation

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04
Security Assurance
Data Leakage
Membership Inference

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04
Feature Extraction Method
Feature Selection Method
Computational Efficiency

Learning to Prompt in the Classroom to Understand AI Limits: A pilot study

Authors: Emily Theophilou, Cansu Koyuturk, Mona Yavari, Sathya Bursic, Gregor Donabauer, Alessia Telari, Alessia Testa, Raffaele Boiano, Davinia Hernandez-Leo, Martin Ruskov, Davide Taibi, Alessandro Gabbiadini, Dimitri Ognibene | Published: 2023-07-04 | Updated: 2023-09-01
Role of Artificial Intelligence
Education and Follow-up
Educational Approach

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03
Adversarial Example
Adversarial attack
Threat modeling

Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03
Dataset Generation
Data Integrity Constraints
Machine Learning Method

Defending Against Poisoning Attacks in Federated Learning with Blockchain

Authors: Nanqing Dong, Zhipeng Wang, Jiahao Sun, Michael Kampffmeyer, William Knottenbelt, Eric Xing | Published: 2023-07-02 | Updated: 2024-03-12
Poisoning
Voting Mechanism
Federated Learning

New intelligent defense systems to reduce the risks of Selfish Mining and Double-Spending attacks using Learning Automata

Authors: Seyed Ardalan Ghoreishi, Mohammad Reza Meybodi | Published: 2023-07-02 | Updated: 2024-03-08
Algorithm Design
Security Assurance
Reinforcement Learning Environment

Classifying World War II Era Ciphers with Machine Learning

Authors: Brooke Dalton, Mark Stamp | Published: 2023-07-02 | Updated: 2023-08-30
Hyperparameter Tuning
History of Cryptography
Machine Learning Technology