Evaluating Privacy Leakage in Split Learning

Authors: Xinchi Qiu, Ilias Leontiadis, Luca Melis, Alex Sablayrolles, Pierre Stock | Published: 2023-05-22 | Updated: 2024-01-19

Fact-Checking Complex Claims with Program-Guided Reasoning

Authors: Liangming Pan, Xiaobao Wu, Xinyuan Lu, Anh Tuan Luu, William Yang Wang, Min-Yen Kan, Preslav Nakov | Published: 2023-05-22

Quantifying Association Capabilities of Large Language Models and Its Implications on Privacy Leakage

Authors: Hanyin Shao, Jie Huang, Shen Zheng, Kevin Chen-Chuan Chang | Published: 2023-05-22 | Updated: 2024-02-09

In the Name of Fairness: Assessing the Bias in Clinical Record De-identification

Authors: Yuxin Xiao, Shulammite Lim, Tom Joseph Pollard, Marzyeh Ghassemi | Published: 2023-05-18 | Updated: 2024-01-03

Attacks on Online Learners: a Teacher-Student Analysis

Authors: Riccardo Giuseppe Margiotta, Sebastian Goldt, Guido Sanguinetti | Published: 2023-05-18 | Updated: 2023-10-29

Survey of Malware Analysis through Control Flow Graph using Machine Learning

Authors: Shaswata Mitra, Stephen A. Torri, Sudip Mittal | Published: 2023-05-15 | Updated: 2023-06-20

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti | Published: 2023-05-15 | Updated: 2023-06-19

DNN-Defender: A Victim-Focused In-DRAM Defense Mechanism for Taming Adversarial Weight Attack on DNNs

Authors: Ranyang Zhou, Sabbir Ahmed, Adnan Siraj Rakin, Shaahin Angizi | Published: 2023-05-14 | Updated: 2024-09-10

Active Retrieval Augmented Generation

Authors: Zhengbao Jiang, Frank F. Xu, Luyu Gao, Zhiqing Sun, Qian Liu, Jane Dwivedi-Yu, Yiming Yang, Jamie Callan, Graham Neubig | Published: 2023-05-11 | Updated: 2023-10-22

Spear Phishing With Large Language Models

Authors: Julian Hazell | Published: 2023-05-11 | Updated: 2023-12-22