Mobile Augmented Reality with Federated Learning in the Metaverse

Authors: Xinyu Zhou, Jun Zhao | Published: 2022-12-16 | Updated: 2023-11-07

Dataflow Analysis-Inspired Deep Learning for Efficient Vulnerability Detection

Authors: Benjamin Steenhoek, Hongyang Gao, Wei Le | Published: 2022-12-15 | Updated: 2023-10-01

Constitutional AI: Harmlessness from AI Feedback

Authors: Yuntao Bai, Saurav Kadavath, Sandipan Kundu, Amanda Askell, Jackson Kernion, Andy Jones, Anna Chen, Anna Goldie, Azalia Mirhoseini, Cameron McKinnon, Carol Chen, Catherine Olsson, Christopher Olah, Danny Hernandez, Dawn Drain, Deep Ganguli, Dustin Li, Eli Tran-Johnson, Ethan Perez, Jamie Kerr, Jared Mueller, Jeffrey Ladish, Joshua Landau, Kamal Ndousse, Kamile Lukosuite, Liane Lovitt, Michael Sellitto, Nelson Elhage, Nicholas Schiefer, Noemi Mercado, Nova DasSarma, Robert Lasenby, Robin Larson, Sam Ringer, Scott Johnston, Shauna Kravec, Sheer El Showk, Stanislav Fort, Tamera Lanham, Timothy Telleen-Lawton, Tom Conerly, Tom Henighan, Tristan Hume, Samuel R. Bowman, Zac Hatfield-Dodds, Ben Mann, Dario Amodei, Nicholas Joseph, Sam McCandlish, Tom Brown, Jared Kaplan | Published: 2022-12-15

Dissecting Distribution Inference

Authors: Anshuman Suri, Yifu Lu, Yanjin Chen, David Evans | Published: 2022-12-15 | Updated: 2024-04-05

FNDaaS: Content-agnostic Detection of Fake News sites

Authors: Panagiotis Papadopoulos, Dimitris Spithouris, Evangelos P. Markatos, Nicolas Kourtellis | Published: 2022-12-13 | Updated: 2025-03-18

REAP: A Large-Scale Realistic Adversarial Patch Benchmark

Authors: Nabeel Hingun, Chawin Sitawarin, Jerry Li, David Wagner | Published: 2022-12-12 | Updated: 2023-08-18

A Dependable Hybrid Machine Learning Model for Network Intrusion Detection

Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27

XRand: Differentially Private Defense against Explanation-Guided Attacks

Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai | Published: 2022-12-08 | Updated: 2022-12-14

Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing

Authors: Mohammad Malekzadeh, Deniz Gunduz | Published: 2022-12-08 | Updated: 2024-10-01

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13