Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16 Security AssuranceData ObfuscationPrivacy Analysis 2023.07.01 2025.05.28 Literature Database
Provable Robust Watermarking for AI-Generated Text Authors: Xuandong Zhao, Prabhanjan Ananth, Lei Li, Yu-Xiang Wang | Published: 2023-06-30 | Updated: 2023-10-13 Text Perturbation MethodDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2023.06.30 2025.05.28 Literature Database
TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29 Dataset GenerationOptimization MethodsQuantum Cryptography Technology 2023.06.29 2025.05.28 Literature Database
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29 Scalability AnalysisNetwork Threat DetectionVulnerability Management 2023.06.29 2025.05.28 Literature Database
Group-based Robustness: A General Framework for Customized Robustness in the Real World Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10 Group-Based RobustnessAttack EvaluationAdversarial Attack Detection 2023.06.29 2025.05.28 Literature Database
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 Data Origins and EvolutionData Contamination DetectionBackdoor Attack 2023.06.28 2025.05.28 Literature Database
On the Exploitability of Instruction Tuning Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28 Prompt InjectionPoisoningAdversarial Attack Detection 2023.06.28 2025.05.28 Literature Database
VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing Authors: Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | Published: 2023-06-28 MPC AlgorithmComputational ComplexityFederated Learning 2023.06.28 2025.05.28 Literature Database
MLSMM: Machine Learning Security Maturity Model Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28 AI ComplianceSecurity labelThreat modeling 2023.06.28 2025.05.28 Literature Database
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 IoC Analysis MethodData Collectionevaluation metrics 2023.06.28 2025.05.28 Literature Database