Performance Evaluation

Efficient Skip Connections Realization for Secure Inference on Encrypted Data

Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11
Privacy Technique
Real-Time Inference
Performance Evaluation

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08
Security Analysis
Performance Evaluation
Machine Learning Technology

Clustered Federated Learning Architecture for Network Anomaly Detection in Large Scale Heterogeneous IoT Networks

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2023-03-28 | Updated: 2023-07-27
Client Clustering
Clustering methods
Performance Evaluation

MGTBench: Benchmarking Machine-Generated Text Detection

Authors: Xinlei He, Xinyue Shen, Zeyuan Chen, Michael Backes, Yang Zhang | Published: 2023-03-26 | Updated: 2024-01-16
MGT Detection Method
Prompt Injection
Performance Evaluation

In-Context Retrieval-Augmented Language Models

Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01
RAG
Data Generation Method
Performance Evaluation

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03
Backdoor Attack
Poisoning
Performance Evaluation

Constitutional AI: Harmlessness from AI Feedback

Authors: Yuntao Bai, Saurav Kadavath, Sandipan Kundu, Amanda Askell, Jackson Kernion, Andy Jones, Anna Chen, Anna Goldie, Azalia Mirhoseini, Cameron McKinnon, Carol Chen, Catherine Olsson, Christopher Olah, Danny Hernandez, Dawn Drain, Deep Ganguli, Dustin Li, Eli Tran-Johnson, Ethan Perez, Jamie Kerr, Jared Mueller, Jeffrey Ladish, Joshua Landau, Kamal Ndousse, Kamile Lukosuite, Liane Lovitt, Michael Sellitto, Nelson Elhage, Nicholas Schiefer, Noemi Mercado, Nova DasSarma, Robert Lasenby, Robin Larson, Sam Ringer, Scott Johnston, Shauna Kravec, Sheer El Showk, Stanislav Fort, Tamera Lanham, Timothy Telleen-Lawton, Tom Conerly, Tom Henighan, Tristan Hume, Samuel R. Bowman, Zac Hatfield-Dodds, Ben Mann, Dario Amodei, Nicholas Joseph, Sam McCandlish, Tom Brown, Jared Kaplan | Published: 2022-12-15
Alignment
Prompt Injection
Performance Evaluation

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Differentially Private Diffusion Models

Authors: Tim Dockhorn, Tianshi Cao, Arash Vahdat, Karsten Kreis | Published: 2022-10-18 | Updated: 2023-12-31
Privacy Assessment
Performance Evaluation
Generative Adversarial Network

MaSS: Multi-attribute Selective Suppression

Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati | Published: 2022-10-18 | Updated: 2022-10-24
Data Privacy Assessment
Poisoning
Performance Evaluation