Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications Authors: Heng Xu, Tianqing Zhu, Wanlei Zhou | Published: 2024-10-14 2024.10.14 2025.04.03 文献データベース
Survival of the Safest: Towards Secure Prompt Optimization through Interleaved Multi-Objective Evolution Authors: Ankita Sinha, Wendi Cui, Kamalika Das, Jiaxin Zhang | Published: 2024-10-12 2024.10.12 2025.04.03 文献データベース
Minimax rates of convergence for nonparametric regression under adversarial attacks Authors: Jingfu Peng, Yuhong Yang | Published: 2024-10-12 2024.10.12 2025.04.03 文献データベース
Can a large language model be a gaslighter? Authors: Wei Li, Luyao Zhu, Yang Song, Ruixi Lin, Rui Mao, Yang You | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
Federated Learning in Practice: Reflections and Projections Authors: Katharine Daly, Hubert Eichner, Peter Kairouz, H. Brendan McMahan, Daniel Ramage, Zheng Xu | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
Decoding Secret Memorization in Code LLMs Through Token-Level Characterization Authors: Yuqing Nie, Chong Wang, Kailong Wang, Guoai Xu, Guosheng Xu, Haoyu Wang | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
PoisonBench: Assessing Large Language Model Vulnerability to Data Poisoning Authors: Tingchen Fu, Mrinank Sharma, Philip Torr, Shay B. Cohen, David Krueger, Fazl Barez | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 2024.10.11 2025.04.03 文献データベース
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
MergePrint: Robust Fingerprinting against Merging Large Language Models Authors: Shojiro Yamabe, Tsubasa Takahashi, Futa Waseda, Koki Wataoka | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース