Literature Database

OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud

Authors: Shuai Yuan, Hongwei Li, Xinyuan Qian, Guowen Xu | Published: 2024-09-28 | Updated: 2025-07-21
プライバシーと最適化
Performance Evaluation Method
Encryption Method

Enhancing Robustness of Graph Neural Networks through p-Laplacian

Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27
Optimization Problem
Defense Method

System-Level Defense against Indirect Prompt Injection Attacks: An Information Flow Control Perspective

Authors: Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao | Published: 2024-09-27 | Updated: 2024-10-10
LLM Security
Prompt Injection
Execution Trace Interference

Code Vulnerability Repair with Large Language Model using Context-Aware Prompt Tuning

Authors: Arshiya Khan, Guannan Liu, Xing Gao | Published: 2024-09-27 | Updated: 2025-06-11
コード脆弱性修復
セキュリティコンテキスト統合
Large Language Model

An Adversarial Perspective on Machine Unlearning for AI Safety

Authors: Jakub Łucki, Boyi Wei, Yangsibo Huang, Peter Henderson, Florian Tramèr, Javier Rando | Published: 2024-09-26 | Updated: 2025-04-10
Prompt Injection
Safety Alignment
Machine Unlearning

Weak-to-Strong Backdoor Attack for Large Language Models

Authors: Shuai Zhao, Leilei Gan, Zhongliang Guo, Xiaobao Wu, Luwei Xiao, Xiaoyu Xu, Cong-Duy Nguyen, Luu Anh Tuan | Published: 2024-09-26 | Updated: 2024-10-13
Backdoor Attack
Prompt Injection

MoJE: Mixture of Jailbreak Experts, Naive Tabular Classifiers as Guard for Prompt Attacks

Authors: Giandomenico Cornacchia, Giulio Zizzo, Kieran Fraser, Muhammad Zaid Hameed, Ambrish Rawat, Mark Purcell | Published: 2024-09-26 | Updated: 2024-10-04
Guardrail Method
Content Moderation
Prompt Injection

A novel application of Shapley values for large multidimensional time-series data: Applying explainable AI to a DNA profile classification neural network

Authors: Lauren Elborough, Duncan Taylor, Melissa Humphries | Published: 2024-09-26
Algorithm
Watermarking
Evaluation Method

Multi-Designated Detector Watermarking for Language Models

Authors: Zhengan Huang, Gongxian Zeng, Xin Mu, Yu Wang, Yue Yu | Published: 2024-09-26 | Updated: 2024-10-01
LLM Security
Watermarking
Watermark Evaluation

The poison of dimensionality

Authors: Lê-Nguyên Hoang | Published: 2024-09-25
Poisoning
Model Performance Evaluation
Loss Function