Provable Robust Watermarking for AI-Generated Text Authors: Xuandong Zhao, Prabhanjan Ananth, Lei Li, Yu-Xiang Wang | Published: 2023-06-30 | Updated: 2023-10-13 2023.06.30 2025.04.03 文献データベース
TrojanNet: Detecting Trojans in Quantum Circuits using Machine Learning Authors: Subrata Das, Swaroop Ghosh | Published: 2023-06-29 2023.06.29 2025.04.03 文献データベース
A Survey on Enterprise Network Security: Asset Behavioral Monitoring and Distributed Attack Detection Authors: Minzhao Lyu, Hassan Habibi Gharakheili, Vijay Sivaraman | Published: 2023-06-29 2023.06.29 2025.04.03 文献データベース
Group-based Robustness: A General Framework for Customized Robustness in the Real World Authors: Weiran Lin, Keane Lucas, Neo Eyal, Lujo Bauer, Michael K. Reiter, Mahmood Sharif | Published: 2023-06-29 | Updated: 2024-03-10 2023.06.29 2025.04.03 文献データベース
On Practical Aspects of Aggregation Defenses against Data Poisoning Attacks Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-06-28 2023.06.28 2025.04.03 文献データベース
On the Exploitability of Instruction Tuning Authors: Manli Shu, Jiongxiao Wang, Chen Zhu, Jonas Geiping, Chaowei Xiao, Tom Goldstein | Published: 2023-06-28 | Updated: 2023-10-28 2023.06.28 2025.04.03 文献データベース
VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing Authors: Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | Published: 2023-06-28 2023.06.28 2025.04.03 文献データベース
MLSMM: Machine Learning Security Maturity Model Authors: Felix Jedrzejewski, Davide Fucci, Oleksandr Adamov | Published: 2023-06-28 2023.06.28 2025.04.03 文献データベース
Can Twitter be used to Acquire Reliable Alerts against Novel Cyber Attacks? Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Andrea Di Sorbo, Corrado A. Visaggio, Mauro Conti | Published: 2023-06-28 2023.06.28 2025.04.03 文献データベース
Uncovering the Limits of Machine Learning for Automatic Vulnerability Detection Authors: Niklas Risse, Marcel Böhme | Published: 2023-06-28 | Updated: 2024-06-06 2023.06.28 2025.04.03 文献データベース