A Watermark for Large Language Models

Authors: John Kirchenbauer, Jonas Geiping, Yuxin Wen, Jonathan Katz, Ian Miers, Tom Goldstein | Published: 2023-01-24 | Updated: 2024-05-01

DODEM: DOuble DEfense Mechanism Against Adversarial Attacks Towards Secure Industrial Internet of Things Analytics

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2023-01-23

Backdoor Attacks in Peer-to-Peer Federated Learning

Authors: Georgios Syros, Gokberk Yar, Simona Boboila, Cristina Nita-Rotaru, Alina Oprea | Published: 2023-01-23 | Updated: 2024-09-17

Split Ways: Privacy-Preserving Training of Encrypted Data Using Split Learning

Authors: Tanveer Khan, Khoa Nguyen, Antonis Michalas | Published: 2023-01-20

Towards Understanding How Self-training Tolerates Data Backdoor Poisoning

Authors: Soumyadeep Pal, Ren Wang, Yuguang Yao, Sijia Liu | Published: 2023-01-20

On the Vulnerability of Backdoor Defenses for Federated Learning

Authors: Pei Fang, Jinghui Chen | Published: 2023-01-19

Universal Neural-Cracking-Machines: Self-Configurable Password Models from Auxiliary Data

Authors: Dario Pasquini, Giuseppe Ateniese, Carmela Troncoso | Published: 2023-01-18 | Updated: 2024-03-13

Threats, Vulnerabilities, and Controls of Machine Learning Based Systems: A Survey and Taxonomy

Authors: Yusuke Kawamoto, Kazumasa Miyake, Koichi Konishi, Yutaka Oiwa | Published: 2023-01-18 | Updated: 2023-01-19

Using Topological Data Analysis to classify Encrypted Bits

Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18

Command Line Interface Risk Modeling

Authors: Dr Anthony L. Faulds | Published: 2023-01-17