Training Method

LLM Unlearning Should Be Form-Independent

Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09
Training Method
Certified Robustness
非意味的リダイレクション

Case Study: Fine-tuning Small Language Models for Accurate and Private CWE Detection in Python Code

Authors: Md. Azizul Hakim Bappy, Hossen A Mustafa, Prottoy Saha, Rajinus Salehat | Published: 2025-04-23
LLM Performance Evaluation
Training Method
Prompt leaking

Is poisoning a real threat to LLM alignment? Maybe more so than you think

Authors: Pankayaraj Pathmanathan, Souradip Chakraborty, Xiangyu Liu, Yongyuan Liang, Furong Huang | Published: 2024-06-17 | Updated: 2025-06-09
Training Method
Backdoor Attack Techniques
Detection of Poisonous Data

Protecting the integrity of the training procedure of neural networks

Authors: Christian Berghoff | Published: 2020-05-14
Data Dependency
Training Method
Machine Learning Algorithm

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08
URL-based Detection
Training Method
Machine Learning Technology

DYSAN: Dynamically sanitizing motion sensor data against sensitive inferences through adversarial networks

Authors: Claude Rosin Ngueveu, Antoine Boutet, Carole Frindel, Sébastien Gambs, Théo Jourdan, Claude Rosin | Published: 2020-03-23 | Updated: 2020-10-08
Training Method
Privacy Protection Method
User Activity Analysis

One Neuron to Fool Them All

Authors: Anshuman Suri, David Evans | Published: 2020-03-20 | Updated: 2020-06-09
Training Method
Robustness
Adversarial Example

Robust Deep Reinforcement Learning against Adversarial Perturbations on State Observations

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Bo Li, Mingyan Liu, Duane Boning, Cho-Jui Hsieh | Published: 2020-03-19 | Updated: 2021-07-14
Training Method
Hyperparameter Optimization
Robustness

Neural Fuzzy Extractors: A Secure Way to Use Artificial Neural Networks for Biometric User Authentication

Authors: Abhishek Jana, Bipin Paudel, Md Kamruzzaman Sarker, Monireh Ebrahimi, Pascal Hitzler, George T Amariucai | Published: 2020-03-18 | Updated: 2023-12-19
Error Correction Code
Training Method
Privacy Protection Method

Stop-and-Go: Exploring Backdoor Attacks on Deep Reinforcement Learning-based Traffic Congestion Control Systems

Authors: Yue Wang, Esha Sarkar, Wenqing Li, Michail Maniatakos, Saif Eddin Jabari | Published: 2020-03-17 | Updated: 2021-08-26
Training Method
State Transition Model
Vulnerability Attack Method