SoK: Verifiable Cross-Silo FL

Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11

Time Traveling to Defend Against Adversarial Example Attacks in Image Classification

Authors: Anthony Etim, Jakub Szefer | Published: 2024-10-10

Privately Learning from Graphs with Applications in Fine-tuning Large Language Models

Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10

Study of Attacks on the HHL Quantum Algorithm

Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10

APOLLO: A GPT-based tool to detect phishing emails and generate explanations that warn users

Authors: Giuseppe Desolda, Francesco Greco, Luca Viganò | Published: 2024-10-10

Detecting Training Data of Large Language Models via Expectation Maximization

Authors: Gyuwan Kim, Yang Li, Evangelia Spiliopoulou, Jie Ma, Miguel Ballesteros, William Yang Wang | Published: 2024-10-10

RealVul: Can We Detect Vulnerabilities in Web Applications with LLM?

Authors: Di Cao, Yong Liao, Xiuwei Shang | Published: 2024-10-10

Instructional Segment Embedding: Improving LLM Safety with Instruction Hierarchy

Authors: Tong Wu, Shujian Zhang, Kaiqiang Song, Silei Xu, Sanqiang Zhao, Ravi Agrawal, Sathish Reddy Indurthi, Chong Xiang, Prateek Mittal, Wenxuan Zhou | Published: 2024-10-09

Data Taggants: Dataset Ownership Verification via Harmless Targeted Data Poisoning

Authors: Wassim Bouaziz, El-Mahdi El-Mhamdi, Nicolas Usunier | Published: 2024-10-09

Diffuse or Confuse: A Diffusion Deepfake Speech Dataset

Authors: Anton Firc, Kamil Malinka, Petr Hanáček | Published: 2024-10-09