Contrastive explainable clustering with differential privacy Authors: Dung Nguyen, Ariel Vetzler, Sarit Kraus, Anil Vullikanti | Published: 2024-06-07 AlgorithmWatermarkingPrivacy Protection Method 2024.06.07 2025.05.27 Literature Database
FedAdOb: Privacy-Preserving Federated Deep Learning with Adaptive Obfuscation Authors: Hanlin Gu, Jiahuan Luo, Yan Kang, Yuan Yao, Gongxi Zhu, Bowen Li, Lixin Fan, Qiang Yang | Published: 2024-06-03 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.06.03 2025.05.27 Literature Database
No Vandalism: Privacy-Preserving and Byzantine-Robust Federated Learning Authors: Zhibo Xing, Zijian Zhang, Zi'ang Zhang, Jiamou Liu, Liehuang Zhu, Giovanni Russello | Published: 2024-06-03 WatermarkingBackdoor AttackPoisoning 2024.06.03 2025.05.27 Literature Database
Seeing the Forest through the Trees: Data Leakage from Partial Transformer Gradients Authors: Weijun Li, Qiongkai Xu, Mark Dras | Published: 2024-06-03 | Updated: 2024-10-04 WatermarkingData Privacy AssessmentPrivacy Protection Method 2024.06.03 2025.05.27 Literature Database
VeriSplit: Secure and Practical Offloading of Machine Learning Inferences across IoT Devices Authors: Han Zhang, Zifan Wang, Mihir Dhamankar, Matt Fredrikson, Yuvraj Agarwal | Published: 2024-06-02 | Updated: 2025-03-31 WatermarkingData Privacy AssessmentComputational Efficiency 2024.06.02 2025.05.27 Literature Database
Improved Techniques for Optimization-Based Jailbreaking on Large Language Models Authors: Xiaojun Jia, Tianyu Pang, Chao Du, Yihao Huang, Jindong Gu, Yang Liu, Xiaochun Cao, Min Lin | Published: 2024-05-31 | Updated: 2024-06-05 LLM SecurityWatermarkingPrompt Injection 2024.05.31 2025.05.27 Literature Database
PureGen: Universal Data Purification for Train-Time Poison Defense via Generative Model Dynamics Authors: Sunay Bhat, Jeffrey Jiang, Omead Pooladzandi, Alexander Branch, Gregory Pottie | Published: 2024-05-28 | Updated: 2024-06-02 WatermarkingBackdoor AttackPoisoning 2024.05.28 2025.05.27 Literature Database
$$\mathbf{L^2\cdot M = C^2}$$ Large Language Models are Covert Channels Authors: Simen Gaure, Stefanos Koffas, Stjepan Picek, Sondre Rønjom | Published: 2024-05-24 | Updated: 2024-10-07 LLM Performance EvaluationWatermarkingSecure Communication Channel 2024.05.24 2025.05.27 Literature Database
A Simple Solution for Homomorphic Evaluation on Large Intervals Authors: John Chiang | Published: 2024-05-24 AlgorithmWatermarkingComputational Efficiency 2024.05.24 2025.05.27 Literature Database
AdjointDEIS: Efficient Gradients for Diffusion Models Authors: Zander W. Blasingame, Chen Liu | Published: 2024-05-23 | Updated: 2025-01-21 WatermarkingCompliance with Ethical GuidelinesOptimization Problem 2024.05.23 2025.05.27 Literature Database