Data Selection Strategy

Casting a SPELL: Sentence Pairing Exploration for LLM Limitation-breaking

Authors: Yifan Huang, Xiaojun Jia, Wenbo Guo, Yuqiang Sun, Yihao Huang, Chong Wang, Yang Liu | Published: 2025-12-24
Data Selection Strategy
Prompt Injection
Adversarial Attack Detection

From Retrieval to Reasoning: A Framework for Cyber Threat Intelligence NER with Explicit and Adaptive Instructions

Authors: Jiaren Peng, Hongda Sun, Xuan Tian, Cheng Huang, Zeqing Li, Rui Yan | Published: 2025-12-22
RAG
Data Selection Strategy
Prompt leaking

Mind the Privacy Unit! User-Level Differential Privacy for Language Model Fine-Tuning

Authors: Lynn Chua, Badih Ghazi, Yangsibo Huang, Pritish Kamath, Ravi Kumar, Daogao Liu, Pasin Manurangsi, Amer Sinha, Chiyuan Zhang | Published: 2024-06-20 | Updated: 2024-08-16
Watermarking
Data Selection Strategy
Privacy Protection Method

What is in Your Safe Data? Identifying Benign Data that Breaks Safety

Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20
Data Selection Strategy
Prompt Injection
Psychological Manipulation

Army of Thieves: Enhancing Black-Box Model Extraction via Ensemble based sample selection

Authors: Akshit Jindal, Vikram Goyal, Saket Anand, Chetan Arora | Published: 2023-11-08
Data Selection Strategy
Membership Inference
Improvement of Learning

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14
Algorithm Design
Data Selection Strategy
Model Performance Evaluation

When a RF Beats a CNN and GRU, Together — A Comparison of Deep Learning and Classical Machine Learning Approaches for Encrypted Malware Traffic Classification

Authors: Adi Lichy, Ofek Bader, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2022-06-16
Security Analysis
Data Selection Strategy
Classification Pattern Analysis

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15
Access Control
Security Analysis
Data Selection Strategy

A Characterization of Semi-Supervised Adversarially-Robust PAC Learnability

Authors: Idan Attias, Steve Hanneke, Yishay Mansour | Published: 2022-02-11 | Updated: 2024-05-05
Algorithm Design
Data Selection Strategy
Robustness Evaluation

Case-based reasoning for rare events prediction on strategic sites

Authors: Vincent Vidal, Marie-Caroline Corbineau, Tugdual Ceillier | Published: 2022-02-10
Data Collection
Data Selection Strategy
Risk Prediction and Mitigation