BasedAI: A decentralized P2P network for Zero Knowledge Large Language Models (ZK-LLMs)

Authors: Sean Wellington | Published: 2024-03-01

Transfer Learning for Security: Challenges and Future Directions

Authors: Adrian Shuai Li, Arun Iyengar, Ashish Kundu, Elisa Bertino | Published: 2024-03-01

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05

Attacking Delay-based PUFs with Minimal Adversary Model

Authors: Hongming Fei, Owen Millwood, Prosanta Gope, Jack Miskelly, Biplab Sikdar | Published: 2024-03-01

Crimson: Empowering Strategic Reasoning in Cybersecurity through Large Language Models

Authors: Jiandong Jin, Bowen Tang, Mingxuan Ma, Xiao Liu, Yunfei Wang, Qingnan Lai, Jia Yang, Changling Zhou | Published: 2024-03-01

Teach LLMs to Phish: Stealing Private Information from Language Models

Authors: Ashwinee Panda, Christopher A. Choquette-Choo, Zhengming Zhang, Yaoqing Yang, Prateek Mittal | Published: 2024-03-01

Shifted Interpolation for Differential Privacy

Authors: Jinho Bok, Weijie Su, Jason M. Altschuler | Published: 2024-03-01 | Updated: 2024-06-12

OPAF: Optimized Secure Two-Party Computation Protocols for Nonlinear Activation Functions in Recurrent Neural Network

Authors: Qian Feng, Zhihua Xia, Zhifeng Xu, Jiasi Weng, Jian Weng | Published: 2024-03-01

Watermark Stealing in Large Language Models

Authors: Nikola Jovanović, Robin Staab, Martin Vechev | Published: 2024-02-29 | Updated: 2024-06-24

PRSA: PRompt Stealing Attacks against Large Language Models

Authors: Yong Yang, Changjiang Li, Yi Jiang, Xi Chen, Haoyu Wang, Xuhong Zhang, Zonghui Wang, Shouling Ji | Published: 2024-02-29 | Updated: 2024-06-08