Query Rewriting for Retrieval-Augmented Large Language Models Authors: Xinbei Ma, Yeyun Gong, Pengcheng He, Hai Zhao, Nan Duan | Published: 2023-05-23 | Updated: 2023-10-23 RAGReinforcement Learning EnvironmentInformation Retrieval 2023.05.23 2025.05.28 Literature Database
Expressive Losses for Verified Robustness via Convex Combinations Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth, Alessio Lomuscio | Published: 2023-05-23 | Updated: 2024-03-18 Parameter TuningMachine Learning MethodDeep Learning Method 2023.05.23 2025.05.28 Literature Database
On the Optimal Batch Size for Byzantine-Robust Distributed Learning Authors: Yi-Rui Yang, Chang-Wei Shi, Wu-Jun Li | Published: 2023-05-23 Byzantine Consensus MechanismConvergence PropertyMachine Learning Method 2023.05.23 2025.05.28 Literature Database
Understanding Programs by Exploiting (Fuzzing) Test Cases Authors: Jianyu Zhao, Yuyang Rong, Yiwen Guo, Yifeng He, Hao Chen | Published: 2023-05-23 | Updated: 2023-06-12 Code Change AnalysisProgram UnderstandingIntellectual Property Protection 2023.05.23 2025.05.28 Literature Database
Differential Privacy with Random Projections and Sign Random Projections Authors: Ping Li, Xiaoyun Li | Published: 2023-05-22 | Updated: 2023-06-13 Data Privacy AssessmentPrivacy Enhancing TechnologyWatermark Evaluation 2023.05.22 2025.05.28 Literature Database
Evaluating Privacy Leakage in Split Learning Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19 Privacy ViolationPrivacy Protection MethodAttack Method 2023.05.22 2025.05.28 Literature Database
Fact-Checking Complex Claims with Program-Guided Reasoning Authors: Liangming Pan, Xiaobao Wu, Xinyuan Lu, Anh Tuan Luu, William Yang Wang, Min-Yen Kan, Preslav Nakov | Published: 2023-05-22 Prompt validationDetection of MisinformationReal-World Fact-Checking 2023.05.22 2025.05.28 Literature Database
Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09 LLM Performance EvaluationPrivacy ViolationPrivacy Protection Method 2023.05.22 2025.05.28 Literature Database
In the Name of Fairness: Assessing the Bias in Clinical Record De-identification Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03 Privacy Protection MethodFairness evaluationThreats of Medical AI 2023.05.18 2025.05.28 Literature Database
Attacks on Online Learners: a Teacher-Student Analysis Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29 Backdoor AttackReinforcement LearningAdversarial Example 2023.05.18 2025.05.28 Literature Database