Trust Evaluation Module

Pathway to Secure and Trustworthy ZSM for LLMs: Attacks, Defense, and Opportunities

Authors: Sunder Ali Khowaja, Parus Khuwaja, Kapal Dev, Hussam Al Hamadi, Engin Zeydan | Published: 2024-08-01 | Updated: 2025-01-06
LLM Security
Membership Inference
Trust Evaluation Module

Treatment of Statistical Estimation Problems in Randomized Smoothing for Adversarial Robustness

Authors: Vaclav Voracek | Published: 2024-06-25 | Updated: 2025-01-20
Trust Evaluation Module
Evaluation Method
Watermark Evaluation

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15
Algorithm Design
Privacy Protection Method
Trust Evaluation Module

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05
Robustness Evaluation
Trust Evaluation Module
Vulnerability Analysis

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24
Model Performance Evaluation
Trust Evaluation Module
Adversarial Example Detection

Saving Stochastic Bandits from Poisoning Attacks via Limited Data Verification

Authors: Anshuka Rangi, Long Tran-Thanh, Haifeng Xu, Massimo Franceschetti | Published: 2021-02-15 | Updated: 2022-05-03
Watermarking
Data-Driven Vulnerability Assessment
Trust Evaluation Module

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28
Protocol Procedure
Trust Evaluation Module
Information Gathering Methods