A Randomized Approach for Tight Privacy Accounting Authors: Jiachen T. Wang, Saeed Mahloujifar, Tong Wu, Ruoxi Jia, Prateek Mittal | Published: 2023-04-17 | Updated: 2023-11-21 2023.04.17 2025.04.03 文献データベース
Few-shot Weakly-supervised Cybersecurity Anomaly Detection Authors: Rahul Kale, Vrizlynn L. L. Thing | Published: 2023-04-15 2023.04.15 2025.04.03 文献データベース
Combining Generators of Adversarial Malware Examples to Increase Evasion Rate Authors: Matouš Kozák, Martin Jureček | Published: 2023-04-14 2023.04.14 2025.04.03 文献データベース
Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13 2023.04.13 2025.04.03 文献データベース
Understanding Overfitting in Adversarial Training via Kernel Regression Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19 2023.04.13 2025.04.03 文献データベース
Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14 2023.04.12 2025.04.03 文献データベース
Zero-Knowledge Proof-based Practical Federated Learning on Blockchain Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24 2023.04.12 2025.04.03 文献データベース
RRHF: Rank Responses to Align Language Models with Human Feedback without tears Authors: Zheng Yuan, Hongyi Yuan, Chuanqi Tan, Wei Wang, Songfang Huang, Fei Huang | Published: 2023-04-11 | Updated: 2023-10-07 2023.04.11 2025.04.03 文献データベース
Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11 2023.04.11 2025.04.03 文献データベース
Multi-step Jailbreaking Privacy Attacks on ChatGPT Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01 2023.04.11 2025.04.03 文献データベース