A Semantic Invariant Robust Watermark for Large Language Models Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19 WatermarkingPrompt InjectionPerformance Evaluation 2023.10.10 2025.05.28 Literature Database
Differentially Private Multi-Site Treatment Effect Estimation Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10 Privacy ClassificationPerformance EvaluationInformation Hiding Techniques 2023.10.10 2025.05.28 Literature Database
Breaking On-Chip Communication Anonymity using Flow Correlation Attacks Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06 Performance EvaluationTraffic Correlation AttackDefense Method 2023.09.27 2025.05.28 Literature Database
LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04 WatermarkingPerformance EvaluationDeep Learning Method 2023.09.25 2025.05.28 Literature Database
Multi-Source Domain Adaptation meets Dataset Distillation through Dataset Dictionary Learning Authors: Eduardo Fernandes Montesuma, Fred Ngolè Mboula, Antoine Souloumiac | Published: 2023-09-14 WatermarkingData GenerationPerformance Evaluation 2023.09.14 2025.05.28 Literature Database
Optimized Deep Learning Models for Malware Detection under Concept Drift Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01 Performance EvaluationOptimization MethodsDeep Learning Method 2023.08.21 2025.05.28 Literature Database
A Modular and Adaptive System for Business Email Compromise Detection Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21 Business Email CompromisePhishing DetectionPerformance Evaluation 2023.08.21 2025.05.28 Literature Database
PentestGPT: An LLM-empowered Automatic Penetration Testing Tool Authors: Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-13 | Updated: 2024-06-02 Prompt InjectionPenetration Testing MethodsPerformance Evaluation 2023.08.13 2025.05.28 Literature Database
A Homomorphic Encryption Framework for Privacy-Preserving Spiking Neural Networks Authors: Farzad Nikfam, Raffaele Casaburi, Alberto Marchisio, Maurizio Martina, Muhammad Shafique | Published: 2023-08-10 | Updated: 2023-10-12 WatermarkingModel Design and AccuracyPerformance Evaluation 2023.08.10 2025.05.28 Literature Database
Random-Set Neural Networks (RS-NN) Authors: Shireen Kudukkil Manchingal, Muhammad Mubashar, Kaizheng Wang, Keivan Shariatmadar, Fabio Cuzzolin | Published: 2023-07-11 | Updated: 2025-02-14 Quantification of UncertaintyPerformance EvaluationLoss Function 2023.07.11 2025.05.28 Literature Database