Literature Database

Query Rewriting for Retrieval-Augmented Large Language Models

Authors: Xinbei Ma, Yeyun Gong, Pengcheng He, Hai Zhao, Nan Duan | Published: 2023-05-23 | Updated: 2023-10-23
RAG
Reinforcement Learning Environment
Information Retrieval

Expressive Losses for Verified Robustness via Convex Combinations

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18
Parameter Tuning
Machine Learning Method
Deep Learning Method

On the Optimal Batch Size for Byzantine-Robust Distributed Learning

Authors: Yi-Rui Yang, Chang-Wei Shi, Wu-Jun Li | Published: 2023-05-23
Byzantine Consensus Mechanism
Convergence Property
Machine Learning Method

Understanding Programs by Exploiting (Fuzzing) Test Cases

Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12
Code Change Analysis
Program Understanding
Intellectual Property Protection

Differential Privacy with Random Projections and Sign Random Projections

Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13
Data Privacy Assessment
Privacy Enhancing Technology
Watermark Evaluation

Evaluating Privacy Leakage in Split Learning

Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19
Privacy Violation
Privacy Protection Method
Attack Method

Fact-Checking Complex Claims with Program-Guided Reasoning

Authors: Liangming Pan, Xiaobao Wu, Xinyuan Lu, Anh Tuan Luu, William Yang Wang, Min-Yen Kan, Preslav Nakov | Published: 2023-05-22
Prompt validation
Detection of Misinformation
Real-World Fact-Checking

Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage

Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09
LLM Performance Evaluation
Privacy Violation
Privacy Protection Method

In the Name of Fairness: Assessing the Bias in Clinical Record De-identification

Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03
Privacy Protection Method
Fairness evaluation
Threats of Medical AI

Attacks on Online Learners: a Teacher-Student Analysis

Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29
Backdoor Attack
Reinforcement Learning
Adversarial Example