PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07 RAGPerformance Evaluation MethodDeep Learning 2025.08.07 2025.08.09 Literature Database
Matrix-Free Two-to-Infinity and One-to-Two Norms Estimation Authors: Askar Tsyganov, Evgeny Frolov, Sergey Samsonov, Maxim Rakhuba | Published: 2025-08-06 Robust OptimizationPerformance Evaluation MethodDeep Learning 2025.08.06 2025.08.08 Literature Database
Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.27 Literature Database
Optimizing ML Training with Metagradient Descent Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17 PoisoningSelection and Evaluation of Optimization AlgorithmsDeep Learning 2025.03.17 2025.05.27 Literature Database
Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17 Privacy Protection MethodEfficient Proof SystemDeep Learning 2025.03.17 2025.05.27 Literature Database
TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15 Few-Shot LearningRAGDeep Learning 2025.03.15 2025.05.27 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 Indirect Prompt InjectionDeep LearningVulnerability detection 2025.03.05 2025.05.27 Literature Database
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 Attack MethodAdversarial Example DetectionDeep Learning 2025.03.04 2025.05.27 Literature Database
SimPO: Simple Preference Optimization with a Reference-Free Reward Authors: Yu Meng, Mengzhou Xia, Danqi Chen | Published: 2024-05-23 | Updated: 2024-11-01 AlignmentSelection and Evaluation of Optimization AlgorithmsDeep Learning 2024.05.23 2025.05.27 Literature Database