Unbiased Watermark for Large Language Models Authors: Zhengmian Hu, Lichang Chen, Xidong Wu, Yihan Wu, Hongyang Zhang, Heng Huang | Published: 2023-09-22 | Updated: 2023-10-18 WatermarkingModel Performance EvaluationStatistical Hypothesis Testing 2023.09.22 2025.05.28 Literature Database
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference Authors: Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding | Published: 2023-08-20 MPC AlgorithmModel Performance EvaluationOptimization Methods 2023.08.20 2025.05.28 Literature Database
Attesting Distributional Properties of Training Data for Machine Learning Authors: Vasisht Duddu, Anudeep Das, Nora Khayata, Hossein Yalame, Thomas Schneider, N. Asokan | Published: 2023-08-18 | Updated: 2024-04-09 Security AssuranceModel Performance EvaluationRobustness Evaluation 2023.08.18 2025.05.28 Literature Database
Intrusion Detection based on Federated Learning: a systematic review Authors: Jose L. Hernandez-Ramos, Georgios Karopoulos, Efstratios Chatzoglou, Vasileios Kouliaridis, Enrique Marmol, Aurora Gonzalez-Vidal, Georgios Kambourakis | Published: 2023-08-18 Model Performance EvaluationIntrusion Detection SystemFederated Learning 2023.08.18 2025.05.28 Literature Database
A Graph-based Stratified Sampling Methodology for the Analysis of (Underground) Forums Authors: Giorgio Di Tizio, Gilberto Atondo Siu, Alice Hutchings, Fabio Massacci | Published: 2023-08-18 Data CollectionModel Performance EvaluationMachine Learning Technology 2023.08.18 2025.05.28 Literature Database
Test-Time Poisoning Attacks Against Test-Time Adaptation Models Authors: Tianshuo Cong, Xinlei He, Yun Shen, Yang Zhang | Published: 2023-08-16 PoisoningModel Performance EvaluationAttack Evaluation 2023.08.16 2025.05.28 Literature Database
Robustness Over Time: Understanding Adversarial Examples’ Effectiveness on Longitudinal Versions of Large Language Models Authors: Yugeng Liu, Tianshuo Cong, Zhengyu Zhao, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-08-15 | Updated: 2024-05-06 Prompt InjectionModel Performance EvaluationRobustness Evaluation 2023.08.15 2025.05.28 Literature Database
FedEdge AI-TC: A Semi-supervised Traffic Classification Method based on Trusted Federated Deep Learning for Mobile Edge Computing Authors: Pan Wang, Zeyi Li, Mengyi Fu, Zixuan Wang, Ze Zhang, MinYao Liu | Published: 2023-08-14 Model InterpretabilityModel Performance EvaluationFederated Learning 2023.08.14 2025.05.28 Literature Database
An Empirical Study on Using Large Language Models to Analyze Software Supply Chain Security Failures Authors: Tanmay Singla, Dharun Anandayuvaraj, Kelechi G. Kalu, Taylor R. Schorlemmer, James C. Davis | Published: 2023-08-09 Cyber AttackPrompt InjectionModel Performance Evaluation 2023.08.09 2025.05.28 Literature Database
A Feature Set of Small Size for the PDF Malware Detection Authors: Ran Liu, Charles Nicholas | Published: 2023-08-09 | Updated: 2023-08-10 WatermarkingModel Performance EvaluationFeature Selection Method 2023.08.09 2025.05.28 Literature Database