Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.27 Literature Database
Optimizing ML Training with Metagradient Descent Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17 PoisoningSelection and Evaluation of Optimization AlgorithmsDeep Learning 2025.03.17 2025.05.27 Literature Database
Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17 Privacy Protection MethodEfficient Proof SystemDeep Learning 2025.03.17 2025.05.27 Literature Database
TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15 Few-Shot LearningRAGDeep Learning 2025.03.15 2025.05.27 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 Indirect Prompt InjectionDeep LearningVulnerability detection 2025.03.05 2025.05.27 Literature Database
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 Attack MethodAdversarial Example DetectionDeep Learning 2025.03.04 2025.05.27 Literature Database
SimPO: Simple Preference Optimization with a Reference-Free Reward Authors: Yu Meng, Mengzhou Xia, Danqi Chen | Published: 2024-05-23 | Updated: 2024-11-01 AlignmentSelection and Evaluation of Optimization AlgorithmsDeep Learning 2024.05.23 2025.05.27 Literature Database
A Decade’s Battle on Dataset Bias: Are We There Yet? Authors: Zhuang Liu, Kaiming He | Published: 2024-03-13 | Updated: 2025-03-03 Data CurationBias Elimination in Training DataDeep Learning 2024.03.13 2025.05.27 Literature Database
KTO: Model Alignment as Prospect Theoretic Optimization Authors: Kawin Ethayarajh, Winnie Xu, Niklas Muennighoff, Dan Jurafsky, Douwe Kiela | Published: 2024-02-02 | Updated: 2024-11-19 AlignmentData Generation MethodDeep Learning 2024.02.02 2025.05.27 Literature Database