Using Decentralized Aggregation for Federated Learning with Differential Privacy Authors: Hadeel Abd El-Kareem, Abd El-Moaty Saleh, Ana Fernández-Vilas, Manuel Fernández-Veiga, asser El-Sonbaty | Published: 2023-11-27 Privacy ProtectionPoisoningExperimental Validation 2023.11.27 2025.05.28 Literature Database
Identifying and Mitigating Vulnerabilities in LLM-Integrated Applications Authors: Fengqing Jiang, Zhangchen Xu, Luyao Niu, Boxin Wang, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2023-11-07 | Updated: 2023-11-29 Prompt InjectionExperimental ValidationAttack Method 2023.11.07 2025.05.28 Literature Database
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30 Data GenerationPrivacy TechniqueExperimental Validation 2023.10.30 2025.05.28 Literature Database
Assessing Robustness via Score-Based Adversarial Image Generation Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06 Data GenerationExperimental ValidationDefense Method 2023.10.06 2025.05.28 Literature Database
Out of the Cage: How Stochastic Parrots Win in Cyber Security Environments Authors: Maria Rigaki, Ondřej Lukáš, Carlos A. Catania, Sebastian Garcia | Published: 2023-08-23 | Updated: 2023-08-28 LLM SecurityExperimental ValidationReinforcement Learning Environment 2023.08.23 2025.05.28 Literature Database
An Unbiased Transformer Source Code Learning with Semantic Vulnerability Graph Authors: Nafis Tanveer Islam, Gonzalo De La Torre Parra, Dylan Manuel, Elias Bou-Harb, Peyman Najafirad | Published: 2023-04-17 Experimental ValidationVulnerability detectionevaluation metrics 2023.04.17 2025.05.28 Literature Database
Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06 Prompt InjectionExperimental ValidationAttack Evaluation 2023.04.10 2025.05.28 Literature Database
Inductive Graph Unlearning Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07 Graph Neural NetworkClustering methodsExperimental Validation 2023.04.06 2025.05.28 Literature Database
Exploiting Fairness to Enhance Sensitive Attributes Reconstruction Authors: Julien Ferry, Ulrich Aïvodji, Sébastien Gambs, Marie-José Huguet, Mohamed Siala | Published: 2022-09-02 Privacy Enhancing TechnologyExperimental ValidationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database
Explainable AI for Android Malware Detection: Towards Understanding Why the Models Perform So Well? Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2022-09-02 Model InterpretabilityModel Performance EvaluationExperimental Validation 2022.09.02 2025.05.28 Literature Database