Does Prompt-Tuning Language Model Ensure Privacy? Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15 2023.04.07 2025.04.03 文献データベース
Reliable learning in challenging environments Authors: Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma | Published: 2023-04-06 | Updated: 2023-10-29 2023.04.06 2025.04.03 文献データベース
Inductive Graph Unlearning Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07 2023.04.06 2025.04.03 文献データベース
IoT Federated Blockchain Learning at the Edge Authors: James Calo, Benny Lo | Published: 2023-04-06 2023.04.06 2025.04.03 文献データベース
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 2023.04.06 2025.04.03 文献データベース
Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 2023.04.05 2025.04.03 文献データベース
Rethinking the Trigger-injecting Position in Graph Backdoor Attack Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18 2023.04.05 2025.04.03 文献データベース
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 2023.04.04 2025.04.03 文献データベース
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 2023.04.04 2025.04.03 文献データベース
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 2023.04.03 2025.04.03 文献データベース