Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities Authors: Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Hussam Al Hamadi, Engin Zeydan | Published: 2024-08-01 | Updated: 2025-01-06 LLM SecurityMembership InferenceTrust Evaluation Module 2024.08.01 2025.05.27 Literature Database
Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20 Trust Evaluation ModuleEvaluation MethodWatermark Evaluation 2024.06.25 2025.05.27 Literature Database
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15 Algorithm DesignPrivacy Protection MethodTrust Evaluation Module 2022.07.15 2025.05.28 Literature Database
Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05 Robustness EvaluationTrust Evaluation ModuleVulnerability Analysis 2022.05.05 2025.05.28 Literature Database
Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24 Model Performance EvaluationTrust Evaluation ModuleAdversarial Example Detection 2021.02.24 2025.05.28 Literature Database
Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03 WatermarkingData-Driven Vulnerability AssessmentTrust Evaluation Module 2021.02.15 2025.05.28 Literature Database
TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28 Protocol ProcedureTrust Evaluation ModuleInformation Gathering Methods 2020.08.28 2025.05.28 Literature Database