Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01 2023.10.30 2025.04.03 文献データベース
Security Challenges for Cloud or Fog Computing-Based AI Applications Authors: Amir Pakmehr, Andreas Aßmuth, Christoph P. Neumann, Gerald Pirkl | Published: 2023-10-30 | Updated: 2023-12-20 2023.10.30 2025.04.03 文献データベース
Balance, Imbalance, and Rebalance: Understanding Robust Overfitting from a Minimax Game Perspective Authors: Yifei Wang, Liangchen Li, Jiansheng Yang, Zhouchen Lin, Yisen Wang | Published: 2023-10-30 2023.10.30 2025.04.03 文献データベース
Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30 2023.10.30 2025.04.03 文献データベース
Label-Only Model Inversion Attacks via Knowledge Transfer Authors: Ngoc-Bao Nguyen, Keshigeyan Chandrasegaran, Milad Abdollahzadeh, Ngai-Man Cheung | Published: 2023-10-30 2023.10.30 2025.04.03 文献データベース
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data Authors: Mayana Pereira, Meghana Kshirsagar, Sumit Mukherjee, Rahul Dodhia, Juan Lavista Ferres, Rafael de Sousa | Published: 2023-10-30 2023.10.30 2025.04.03 文献データベース
From Chatbots to PhishBots? — Preventing Phishing scams created using ChatGPT, Google Bard and Claude Authors: Sayak Saha Roy, Poojitha Thota, Krishna Vamsi Naragam, Shirin Nilizadeh | Published: 2023-10-29 | Updated: 2024-03-10 2023.10.29 2025.04.03 文献データベース
Poisoning Retrieval Corpora by Injecting Adversarial Passages Authors: Zexuan Zhong, Ziqing Huang, Alexander Wettig, Danqi Chen | Published: 2023-10-29 2023.10.29 2025.04.03 文献データベース
Label Poisoning is All You Need Authors: Rishi D. Jha, Jonathan Hayase, Sewoong Oh | Published: 2023-10-29 2023.10.29 2025.04.03 文献データベース
Temperature Monitoring of Agricultural Areas in a Secure Data Room Authors: Thomas Ederer, Martin Ivancsits, Igor Ivkić | Published: 2023-10-27 2023.10.27 2025.04.03 文献データベース