Smoothed Embeddings for Robust Language Models Authors: Ryo Hase, Md Rafi Ur Rashid, Ashley Lewis, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2025-01-27 Prompt InjectionMembership InferenceAdversarial Training 2025.01.27 2025.05.27 Literature Database
Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges Authors: Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo | Published: 2025-01-27 | Updated: 2025-06-24 Energy ManagementModel Extraction AttackAdversarial Learning 2025.01.27 2025.06.26 Literature Database
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14 Network Threat DetectionUser Activity AnalysisImprovement of Learning 2025.01.26 2025.05.27 Literature Database
I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05 Application Classification MethodChanges in User BehaviorMachine Learning Technology 2025.01.25 2025.05.27 Literature Database
Optimizing Privacy-Utility Trade-off in Decentralized Learning with Generalized Correlated Noise Authors: Angelo Rodio, Zheng Chen, Erik G. Larsson | Published: 2025-01-24 | Updated: 2025-07-23 Characteristics of RDPEfficiency of Distributed LearningDifferential Privacy 2025.01.24 2025.07.25 Literature Database
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27 Privacy IssuesWatermarking TechnologyFederated Learning 2025.01.22 2025.05.27 Literature Database
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks Authors: Akshayaa Magesh, Venugopal V. Veeravalli | Published: 2025-01-21 Convergence GuaranteeConvergence AnalysisCommunication Efficiency 2025.01.21 2025.05.27 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.27 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.27 Literature Database
Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu | Published: 2025-01-20 Privacy TechniqueAttack that Analyzes Images with AI to Infer Personal InformationFacial Recognition Technology 2025.01.20 2025.05.27 Literature Database