Attacks on Online Learners: a Teacher-Student Analysis

Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29

Survey of Malware Analysis through Control Flow Graph using Machine Learning

Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal | Published: 2023-05-15 | Updated: 2023-06-20

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti | Published: 2023-05-15 | Updated: 2023-06-19

DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs

Authors: Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi | Published: 2023-05-14 | Updated: 2024-09-10

Active Retrieval Augmented Generation

Authors: Zhengbao Jiang, Frank F. Xu, Luyu Gao, Zhiqing Sun, Qian Liu, Jane Dwivedi-Yu, Yiming Yang, Jamie Callan, Graham Neubig | Published: 2023-05-11 | Updated: 2023-10-22

Spear Phishing With Large Language Models

Authors: Julian Hazell | Published: 2023-05-11 | Updated: 2023-12-22

What Students Can Learn About Artificial Intelligence — Recommendations for K-12 Computing Education

Authors: Tilman Michaeli, Stefan Seegerer, Ralf Romeike | Published: 2023-05-10

Privacy-Preserving Prompt Tuning for Large Language Model Services

Authors: Yansong Li, Zhixing Tan, Yang Liu | Published: 2023-05-10 | Updated: 2025-01-10

DPMLBench: Holistic Evaluation of Differentially Private Machine Learning

Authors: Chengkun Wei, Minghu Zhao, Zhikun Zhang, Min Chen, Wenlong Meng, Bo Liu, Yuan Fan, Wenzhi Chen | Published: 2023-05-10 | Updated: 2023-10-14

Effects of Real-Life Traffic Sign Alteration on YOLOv7- an Object Recognition Model

Authors: Farhin Farhad Riya, Shahinul Hoque, Md Saif Hassan Onim, Edward Michaud, Edmon Begoli, Jinyuan Stella Sun | Published: 2023-05-09 | Updated: 2024-01-29