Performance Evaluation

Constitutional AI: Harmlessness from AI Feedback

Authors: Yuntao Bai, Saurav Kadavath, Sandipan Kundu, Amanda Askell, Jackson Kernion, Andy Jones, Anna Chen, Anna Goldie, Azalia Mirhoseini, Cameron McKinnon, Carol Chen, Catherine Olsson, Christopher Olah, Danny Hernandez, Dawn Drain, Deep Ganguli, Dustin Li, Eli Tran-Johnson, Ethan Perez, Jamie Kerr, Jared Mueller, Jeffrey Ladish, Joshua Landau, Kamal Ndousse, Kamile Lukosuite, Liane Lovitt, Michael Sellitto, Nelson Elhage, Nicholas Schiefer, Noemi Mercado, Nova DasSarma, Robert Lasenby, Robin Larson, Sam Ringer, Scott Johnston, Shauna Kravec, Sheer El Showk, Stanislav Fort, Tamera Lanham, Timothy Telleen-Lawton, Tom Conerly, Tom Henighan, Tristan Hume, Samuel R. Bowman, Zac Hatfield-Dodds, Ben Mann, Dario Amodei, Nicholas Joseph, Sam McCandlish, Tom Brown, Jared Kaplan | Published: 2022-12-15
Alignment
Prompt Injection
Performance Evaluation

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Differentially Private Diffusion Models

Authors: Tim Dockhorn, Tianshi Cao, Arash Vahdat, Karsten Kreis | Published: 2022-10-18 | Updated: 2023-12-31
Privacy Assessment
Performance Evaluation
Generative Adversarial Network

MaSS: Multi-attribute Selective Suppression

Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati | Published: 2022-10-18 | Updated: 2022-10-24
Data Privacy Assessment
Poisoning
Performance Evaluation

Marksman Backdoor: Backdoor Attacks with Arbitrary Target Class

Authors: Khoa D. Doan, Yingjie Lao, Ping Li | Published: 2022-10-17
Backdoor Attack
Performance Evaluation

Federated Learning with Privacy-Preserving Ensemble Attention Distillation

Authors: Xuan Gong, Liangchen Song, Rishi Vedula, Abhishek Sharma, Meng Zheng, Benjamin Planche, Arun Innanje, Terrence Chen, Junsong Yuan, David Doermann, Ziyan Wu | Published: 2022-10-16
Privacy Risk Management
Poisoning
Performance Evaluation

DI-NIDS: Domain Invariant Network Intrusion Detection System

Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15
Performance Evaluation
Machine Learning Technology
Deep Learning Method

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09
Dataset Generation
Performance Evaluation
Generative Adversarial Network

Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle

Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19
Model Performance Evaluation
Improvement of Learning
Performance Evaluation

Prior Knowledge based Advanced Persistent Threats Detection for IoT in a Realistic Benchmark

Authors: Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Mehran Bagheri, Petar Djukic | Published: 2022-08-10
IoT Security Risks
Performance Evaluation
Machine Learning Method