Impact of White-Box Adversarial Attacks on Convolutional Neural Networks Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02 Model Performance EvaluationAttack MethodAdversarial Example 2024.10.02 2025.05.27 Literature Database
The poison of dimensionality Authors: Lê-Nguyên Hoang | Published: 2024-09-25 PoisoningModel Performance EvaluationLoss Function 2024.09.25 2025.05.27 Literature Database
Pretraining Data Detection for Large Language Models: A Divergence-based Calibration Method Authors: Weichao Zhang, Ruqing Zhang, Jiafeng Guo, Maarten de Rijke, Yixing Fan, Xueqi Cheng | Published: 2024-09-23 | Updated: 2025-05-21 Disabling Safety Mechanisms of LLMModel Performance EvaluationInformation Extraction 2024.09.23 2025.05.27 Literature Database
Obliviate: Neutralizing Task-agnostic Backdoors within the Parameter-efficient Fine-tuning Paradigm Authors: Jaehan Kim, Minkyoo Song, Seung Ho Na, Seungwon Shin | Published: 2024-09-21 | Updated: 2024-10-06 Backdoor AttackModel Performance EvaluationDefense Method 2024.09.21 2025.05.27 Literature Database
Extracting Memorized Training Data via Decomposition Authors: Ellen Su, Anu Vellore, Amy Chang, Raffaele Mura, Blaine Nelson, Paul Kassianik, Amin Karbasi | Published: 2024-09-18 | Updated: 2024-10-01 Training Data Extraction MethodPrompting StrategyModel Performance Evaluation 2024.09.18 2025.05.27 Literature Database
Artemis: Efficient Commit-and-Prove SNARKs for zkML Authors: Hidde Lycklama, Alexander Viand, Nikolay Avramov, Nicolas Küchler, Anwar Hithnawi | Published: 2024-09-18 FrameworkModel Performance EvaluationCryptography 2024.09.18 2025.05.27 Literature Database
Hackphyr: A Local Fine-Tuned LLM Agent for Network Security Environments Authors: Maria Rigaki, Carlos Catania, Sebastian Garcia | Published: 2024-09-17 Dataset GenerationFrameworkModel Performance Evaluation 2024.09.17 2025.05.27 Literature Database
DomURLs_BERT: Pre-trained BERT-based Model for Malicious Domains and URLs Detection and Classification Authors: Abdelkader El Mahdaouy, Salima Lamsiyah, Meryem Janati Idrissi, Hamza Alami, Zakaria Yartaoui, Ismail Berrada | Published: 2024-09-13 Dataset GenerationMalware ClassificationModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
FP-VEC: Fingerprinting Large Language Models via Efficient Vector Addition Authors: Zhenhua Xu, Wenpeng Xing, Zhebo Wang, Chang Hu, Chen Jie, Meng Han | Published: 2024-09-13 LLM SecurityFingerprinting MethodModel Performance Evaluation 2024.09.13 2025.05.27 Literature Database
Sub-graph Based Diffusion Model for Link Prediction Authors: Hang Li, Wei Jin, Geri Skenderi, Harry Shomer, Wenzhuo Tang, Wenqi Fan, Jiliang Tang | Published: 2024-09-13 Simulation Result EvaluationModel Performance EvaluationLink Prediction Method 2024.09.13 2025.05.27 Literature Database