SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14 WatermarkingDataset GenerationSafety Alignment 2024.08.14 2025.05.27 Literature Database
Fooling SHAP with Output Shuffling Attacks Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12 AI ComplianceWatermarkingBias 2024.08.12 2025.05.27 Literature Database
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12 Integration of FL and HEWatermarkingPrivacy Protection Method 2024.08.12 2025.05.27 Literature Database
h4rm3l: A language for Composable Jailbreak Attack Synthesis Authors: Moussa Koulako Bala Doumbouya, Ananjan Nandi, Gabriel Poesia, Davide Ghilardi, Anna Goldie, Federico Bianchi, Dan Jurafsky, Christopher D. Manning | Published: 2024-08-09 | Updated: 2025-03-25 WatermarkingPrompt InjectionPrompt Engineering 2024.08.09 2025.05.27 Literature Database
Unveiling Hidden Visual Information: A Reconstruction Attack Against Adversarial Visual Information Hiding Authors: Jonggyu Jang, Hyeonsu Lyu, Seongjin Hwang, Hyun Jong Yang | Published: 2024-08-08 WatermarkingWatermark EvaluationFace Recognition System 2024.08.08 2025.05.27 Literature Database
LaFA: Latent Feature Attacks on Non-negative Matrix Factorization Authors: Minh Vu, Ben Nebgen, Erik Skau, Geigh Zollicoffer, Juan Castorena, Kim Rasmussen, Boian Alexandrov, Manish Bhattarai | Published: 2024-08-07 WatermarkingAttack MethodAdversarial Example 2024.08.07 2025.05.27 Literature Database
On the Robustness of Malware Detectors to Adversarial Samples Authors: Muhammad Salman, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Muhammad Ikram, Sidharth Kaushik, Mohamed Ali Kaafar | Published: 2024-08-05 WatermarkingMalware ClassificationAdversarial Example 2024.08.05 2025.05.27 Literature Database
Model Hijacking Attack in Federated Learning Authors: Zheng Li, Siyuan Wu, Ruichuan Chen, Paarijaat Aditya, Istemi Ekin Akkus, Manohar Vanga, Min Zhang, Hao Li, Yang Zhang | Published: 2024-08-04 WatermarkingClass Mapping MethodPoisoning 2024.08.04 2025.05.27 Literature Database
PromptSAM+: Malware Detection based on Prompt Segment Anything Model Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04 WatermarkingMalware ClassificationModel Performance Evaluation 2024.08.04 2025.05.27 Literature Database
A Survey on the Applications of Zero-Knowledge Proofs Authors: Ryan Lavin, Xuekai Liu, Hardhik Mohanty, Logan Norman, Giovanni Zaarour, Bhaskar Krishnamachari | Published: 2024-08-01 WatermarkingPrivacy ProtectionBlockchain Technology 2024.08.01 2025.05.27 Literature Database