Tree of Attacks: Jailbreaking Black-Box LLMs Automatically Authors: Anay Mehrotra, Manolis Zampetakis, Paul Kassianik, Blaine Nelson, Hyrum Anderson, Yaron Singer, Amin Karbasi | Published: 2023-12-04 | Updated: 2024-10-31 Query Generation MethodPrompt InjectionWatermark Evaluation 2023.12.04 2025.05.28 Literature Database
FRAUDability: Estimating Users’ Susceptibility to Financial Fraud Using Adversarial Machine Learning Authors: Chen Doytshman, Satoru Momiyama, Inderjeet Singh, Yuval Elovici, Asaf Shabtai | Published: 2023-12-02 WatermarkingFraudulent TransactionWatermark Evaluation 2023.12.02 2025.05.28 Literature Database
Deep Unlearning: Fast and Efficient Gradient-free Approach to Class Forgetting Authors: Sangamesh Kodge, Gobinda Saha, Kaushik Roy | Published: 2023-12-01 | Updated: 2024-08-05 WatermarkingMachine UnlearningWatermark Evaluation 2023.12.01 2025.05.28 Literature Database
Mark My Words: Analyzing and Evaluating Language Model Watermarks Authors: Julien Piet, Chawin Sitawarin, Vivian Fang, Norman Mu, David Wagner | Published: 2023-12-01 | Updated: 2024-10-11 Prompt InjectionWatermark RobustnessWatermark Evaluation 2023.12.01 2025.05.28 Literature Database
Continuous Authentication Using Mouse Clickstream Data Analysis Authors: Sultan Almalki, Prosenjit Chatterjee, Kaushik Roy | Published: 2023-11-23 Model Performance EvaluationUser Authentication SystemWatermark Evaluation 2023.11.23 2025.05.28 Literature Database
Shared Adversarial Unlearning: Backdoor Mitigation by Unlearning Shared Adversarial Examples Authors: Shaokui Wei, Mingda Zhang, Hongyuan Zha, Baoyuan Wu | Published: 2023-07-20 Backdoor AttackAdversarial Attack MethodsWatermark Evaluation 2023.07.20 2025.05.28 Literature Database
What can we learn from Data Leakage and Unlearning for Law? Authors: Jaydeep Borkar | Published: 2023-07-19 Data LeakageMeasurement of MemorizationWatermark Evaluation 2023.07.19 2025.05.28 Literature Database
Eliminating Label Leakage in Tree-Based Vertical Federated Learning Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22 Membership InferenceLabel Inference AttackWatermark Evaluation 2023.07.19 2025.05.28 Literature Database
A Privacy-Preserving Federated Learning Approach for Kernel methods Authors: Anika Hannemann, Ali Burak Ünal, Arjhun Swaminathan, Erik Buchmann, Mete Akgün | Published: 2023-06-05 MPC AlgorithmPrivacy Enhancing TechnologyWatermark Evaluation 2023.06.05 2025.05.28 Literature Database
PassGPT: Password Modeling and (Guided) Generation with Large Language Models Authors: Javier Rando, Fernando Perez-Cruz, Briland Hitaj | Published: 2023-06-02 | Updated: 2023-06-14 LLM ApplicationModel Design and AccuracyWatermark Evaluation 2023.06.02 2025.05.28 Literature Database