Literature Database

Gradients Look Alike: Sensitivity is Often Overestimated in DP-SGD

Authors: Anvith Thudi, Hengrui Jia, Casey Meehan, Ilia Shumailov, Nicolas Papernot | Published: 2023-07-01 | Updated: 2024-07-16
Security Assurance
Data Obfuscation
Privacy Analysis

Provable Robust Watermarking for AI-Generated Text

Authors: Xuandong Zhao, Prabhanjan Ananth, Lei Li, Yu-Xiang Wang | Published: 2023-06-30 | Updated: 2023-10-13
Text Perturbation Method
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques

TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning

Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29
Dataset Generation
Optimization Methods
Quantum Cryptography Technology

A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection

Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29
Scalability Analysis
Network Threat Detection
Vulnerability Management

Group-based Robustness: A General Framework for Customized Robustness in the Real World

Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10
Group-Based Robustness
Attack Evaluation
Adversarial Attack Detection

On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28
Data Origins and Evolution
Data Contamination Detection
Backdoor Attack

On the Exploitability of Instruction Tuning

Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28
Prompt Injection
Poisoning
Adversarial Attack Detection

VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing

Authors: Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | Published: 2023-06-28
MPC Algorithm
Computational Complexity
Federated Learning

MLSMM: Machine Learning Security Maturity Model

Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28
AI Compliance
Security label
Threat modeling

Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks?

Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28
IoC Analysis Method
Data Collection
evaluation metrics