L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 AlgorithmWatermarkingCyber Attack 2024.01.27 2025.05.27 Literature Database
Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation Authors: Yiling Xie, Xiaoming Huo | Published: 2024-01-27 WatermarkingAdversarial TrainingAdaptive Adversarial Training 2024.01.27 2025.05.27 Literature Database
Training Differentially Private Ad Prediction Models with Semi-Sensitive Features Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26 AlgorithmWatermarkingPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database
Signing in Four Public Software Package Registries: Quantity, Quality, and Influencing Factors Authors: Taylor R Schorlemmer, Kelechi G Kalu, Luke Chigges, Kyung Myung Ko, Eman Abu Isghair, Saurabh Baghi, Santiago Torres-Arias, James C Davis | Published: 2024-01-26 | Updated: 2024-04-14 WatermarkingIntegration of Digital Signatures and Machine LearningVerification of Digital Signatures 2024.01.26 2025.05.27 Literature Database
Sparse and Transferable Universal Singular Vectors Attack Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25 WatermarkingAdversarial Attack DetectionOptimization Methods 2024.01.25 2025.05.27 Literature Database
Predicting SSH keys in Open SSH Memory dumps Authors: Florian Rascoussier | Published: 2024-01-24 WatermarkingData PreprocessingMemory Management Method 2024.01.24 2025.05.27 Literature Database
Beimingwu: A Learnware Dock System Authors: Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou | Published: 2024-01-24 Beimingwu SystemWatermarkingEfficient Resolution of Learning Tasks 2024.01.24 2025.05.27 Literature Database
MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage Authors: Ying Song, Balaji Palanisamy | Published: 2024-01-23 | Updated: 2025-01-26 WatermarkingBiasMembership Inference 2024.01.23 2025.05.27 Literature Database
Wasserstein Differential Privacy Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23 WatermarkingPrivacy Protection MethodWatermark Evaluation 2024.01.23 2025.05.27 Literature Database