Literature Database

Extracting Cloud-based Model with Prior Knowledge

Authors: Shiqian Zhao, Kangjie Chen, Meng Hao, Jian Zhang, Guowen Xu, Hongwei Li, Tianwei Zhang | Published: 2023-06-07 | Updated: 2023-06-13
Backdoor Attack
Attack Evaluation
Adversarial attack

Knowledge-Augmented Language Model Prompting for Zero-Shot Knowledge Graph Question Answering

Authors: Jinheon Baek, Alham Fikri Aji, Amir Saffari | Published: 2023-06-07
RAG
Movie Cast
Knowledge Graph

Exploring Model Dynamics for Accumulative Poisoning Discovery

Authors: Jianing Zhu, Xiawei Guo, Jiangchao Yao, Chao Du, Li He, Shuo Yuan, Tongliang Liu, Liang Wang, Bo Han | Published: 2023-06-06
Backdoor Attack
Model Design and Accuracy
Adversarial attack

Human-imperceptible, Machine-recognizable Images

Authors: Fusheng Hao, Fengxiang He, Yikai Wang, Fuxiang Wu, Jing Zhang, Jun Cheng, Dacheng Tao | Published: 2023-06-06
Watermarking
Privacy Enhancing Technology
Model Design and Accuracy

Machine Unlearning: A Survey

Authors: Heng Xu, Tianqing Zhu, Lefeng Zhang, Wanlei Zhou, Philip S. Yu | Published: 2023-06-06
Watermarking
Membership Inference
Model Design and Accuracy

Adversarial attacks and defenses in explainable artificial intelligence: A survey

Authors: Hubert Baniecki, Przemyslaw Biecek | Published: 2023-06-06 | Updated: 2024-02-13
Membership Inference
Attack Method
Adversarial Example

A Survey on Federated Learning Poisoning Attacks and Defenses

Authors: Junchuan Lianga, Rong Wang, Chaosheng Feng, Chin-Chen Chang | Published: 2023-06-06
Backdoor Attack
Poisoning
Untargeted Toxicity Attack

Evading Black-box Classifiers Without Breaking Eggs

Authors: Edoardo Debenedetti, Nicholas Carlini, Florian Tramèr | Published: 2023-06-05 | Updated: 2024-02-14
Attack Evaluation
Adversarial Example
Adversarial attack

A Privacy-Preserving Federated Learning Approach for Kernel methods

Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05
MPC Algorithm
Privacy Enhancing Technology
Watermark Evaluation

Building Resilient SMEs: Harnessing Large Language Models for Cyber Security in Australia

Authors: Benjamin Kereopa-Yorke | Published: 2023-06-05
LLM Application
Cyber Attack
Compliance with Ethical Guidelines