Algorithm

Adversarial Training Should Be Cast as a Non-Zero-Sum Game

Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18
Algorithm
Adversarial Example
Optimization Methods

Cyber Key Terrain Identification Using Adjusted PageRank Centrality

Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24
Algorithm
Time Window Analysis
Computational Efficiency

Federated Learning Based Distributed Localization of False Data Injection Attacks on Smart Grids

Authors: Cihat Keçeci, Katherine R. Davis, Erchin Serpedin | Published: 2023-06-17
Algorithm
Deep Learning Method
Federated Learning

Evaluating Superhuman Models with Consistency Checks

Authors: Lukas Fluri, Daniel Paleka, Florian Tramèr | Published: 2023-06-16 | Updated: 2023-10-19
LLM Performance Evaluation
Algorithm
Evaluation Method

Inroads into Autonomous Network Defence using Explained Reinforcement Learning

Authors: Myles Foley, Mia Wang, Zoe M, Chris Hicks, Vasilios Mavroudis | Published: 2023-06-15
Algorithm
Simulation Result Evaluation
Deep Learning Method

Matching Pairs: Attributing Fine-Tuned Models to their Pre-Trained Large Language Models

Authors: Myles Foley, Ambrish Rawat, Taesung Lee, Yufang Hou, Gabriele Picco, Giulio Zizzo | Published: 2023-06-15
LLM Performance Evaluation
Algorithm
Prompt Injection

PLAN: Variance-Aware Private Mean Estimation

Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10
Algorithm
Privacy Technique
Computational Efficiency

Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16
Algorithm
Membership Inference
Computational Efficiency

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON

Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13
Algorithm
Resource Scarcity Issues
Cryptography

IsoEx: an explainable unsupervised approach to process event logs cyber investigation

Authors: Pierre Lavieille, Ismail Alaoui Hassani Atlas | Published: 2023-06-07 | Updated: 2023-07-21
Algorithm
Challenges of Log Analysis
Feature Extraction Method