Constrained Twin Variational Auto-Encoder for Intrusion Detection in IoT Systems Authors: Phai Vu Dinh, Quang Uy Nguyen, Dinh Thai Hoang, Diep N. Nguyen, Son Pham Bao, Eryk Dutkiewicz | Published: 2023-12-05 WatermarkingData GenerationIntrusion Detection System 2023.12.05 2025.05.28 Literature Database
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30 Data GenerationPrivacy TechniqueExperimental Validation 2023.10.30 2025.05.28 Literature Database
Detecting Pretraining Data from Large Language Models Authors: Weijia Shi, Anirudh Ajith, Mengzhou Xia, Yangsibo Huang, Daogao Liu, Terra Blevins, Danqi Chen, Luke Zettlemoyer | Published: 2023-10-25 | Updated: 2024-03-09 Data GenerationNatural Language ProcessingCopyright Trap 2023.10.25 2025.05.28 Literature Database
Poison is Not Traceless: Fully-Agnostic Detection of Poisoning Attacks Authors: Xinglong Chang, Katharina Dost, Gillian Dobbie, Jörg Wicker | Published: 2023-10-24 Data GenerationPoisoningAdversarial Attack Detection 2023.10.24 2025.05.28 Literature Database
Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Thomas Steinke, Abhradeep Thakurta | Published: 2023-10-24 | Updated: 2024-05-04 Data GenerationPrivacy TechniqueModel Design 2023.10.24 2025.05.28 Literature Database
REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models Authors: Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar | Published: 2023-10-18 | Updated: 2024-04-08 Data GenerationModel DesignMalicious Content Generation 2023.10.18 2025.05.28 Literature Database
Private Synthetic Data Meets Ensemble Learning Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15 Data GenerationPrivacy Protection Methodevaluation metrics 2023.10.15 2025.05.28 Literature Database
Embarrassingly Simple Text Watermarks Authors: Ryoma Sato, Yuki Takezawa, Han Bao, Kenta Niwa, Makoto Yamada | Published: 2023-10-13 WatermarkingSteganography TechniquesData Generation 2023.10.13 2025.05.28 Literature Database
Characterizing climate pathways using feature importance on echo state networks Authors: Katherine Goode, Daniel Ries, Kellie McClernon | Published: 2023-10-12 Data GenerationModel InterpretabilityClimate Information 2023.10.12 2025.05.28 Literature Database
ZEST: Attention-based Zero-Shot Learning for Unseen IoT Device Classification Authors: Binghui Wu, Philipp Gysel, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2023-10-12 | Updated: 2024-01-12 IoT Device IdentificationData GenerationSelf-Attention Mechanism 2023.10.12 2025.05.28 Literature Database