Casting a SPELL: Sentence Pairing Exploration for LLM Limitation-breaking Authors: Yifan Huang, Xiaojun Jia, Wenbo Guo, Yuqiang Sun, Yihao Huang, Chong Wang, Yang Liu | Published: 2025-12-24 Data Selection StrategyPrompt InjectionAdversarial Attack Detection 2025.12.24 2025.12.26 Literature Database
From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22 RAGData Selection StrategyPrompt leaking 2025.12.22 2025.12.24 Literature Database
Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16 WatermarkingData Selection StrategyPrivacy Protection Method 2024.06.20 2025.05.27 Literature Database
What is in Your Safe Data? Identifying Benign Data that Breaks Safety Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20 Data Selection StrategyPrompt InjectionPsychological Manipulation 2024.04.01 2025.05.27 Literature Database
Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection Authors: Akshit Jindal, Vikram Goyal, Saket Anand, Chetan Arora | Published: 2023-11-08 Data Selection StrategyMembership InferenceImprovement of Learning 2023.11.08 2025.05.28 Literature Database
A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16 Security AnalysisData Selection StrategyClassification Pattern Analysis 2022.06.16 2025.05.28 Literature Database
YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC Authors: Stefan More, Lukas Alber | Published: 2022-06-15 Access ControlSecurity AnalysisData Selection Strategy 2022.06.15 2025.05.28 Literature Database
A Characterization of Semi-Supervised Adversarially-Robust PAC Learnability Authors: Idan Attias, Steve Hanneke, Yishay Mansour | Published: 2022-02-11 | Updated: 2024-05-05 Algorithm DesignData Selection StrategyRobustness Evaluation 2022.02.11 2025.05.28 Literature Database
Case-based reasoning for rare events prediction on strategic sites Authors: Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier | Published: 2022-02-10 Data CollectionData Selection StrategyRisk Prediction and Mitigation 2022.02.10 2025.05.28 Literature Database