AIJack: Let’s Hijack AI! Security and Privacy Risk Simulator for Machine Learning

Authors: Hideaki Takahashi | Published: 2023-12-29 | Updated: 2024-04-08

Differentially Private Low-Rank Adaptation of Large Language Model Using Federated Learning

Authors: Xiao-Yang Liu, Rongyi Zhu, Daochen Zha, Jiechao Gao, Shan Zhong, Matt White, Meikang Qiu | Published: 2023-12-29 | Updated: 2024-06-02

Can you See me? On the Visibility of NOPs against Android Malware Detectors

Authors: Diego Soi, Davide Maiorca, Giorgio Giacinto, Harel Berger | Published: 2023-12-28

Optimizing watermarks for large language models

Authors: Bram Wouters | Published: 2023-12-28

Attack Tree Analysis for Adversarial Evasion Attacks

Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28

Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics

Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27

Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption

Authors: Dongfang Zhao | Published: 2023-12-26

Robust Survival Analysis with Adversarial Regularization

Authors: Michael Potter, Stefano Maxenti, Michael Everett | Published: 2023-12-26 | Updated: 2024-09-19

Reinforcement Unlearning

Authors: Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue | Published: 2023-12-26 | Updated: 2024-09-09