Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04

Overconfidence is a Dangerous Thing: Mitigating Membership Inference Attacks by Enforcing Less Confident Prediction

Authors: Zitao Chen, Karthik Pattabiraman | Published: 2023-07-04

Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction

Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04

Learning to Prompt in the Classroom to Understand AI Limits: A pilot study

Authors: Emily Theophilou, Cansu Koyuturk, Mona Yavari, Sathya Bursic, Gregor Donabauer, Alessia Telari, Alessia Testa, Raffaele Boiano, Davinia Hernandez-Leo, Martin Ruskov, Davide Taibi, Alessandro Gabbiadini, Dimitri Ognibene | Published: 2023-07-04 | Updated: 2023-09-01

Adversarial Learning in Real-World Fraud Detection: Challenges and Perspectives

Authors: Danele Lunghi, Alkis Simitsis, Olivier Caelen, Gianluca Bontempi | Published: 2023-07-03

Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03