F2A: An Innovative Approach for Prompt Injection by Utilizing Feign Security Detection Agents Authors: Yupeng Ren | Published: 2024-10-11 | Updated: 2024-10-14 2024.10.11 2025.04.03 文献データベース
PILLAR: an AI-Powered Privacy Threat Modeling Tool Authors: Majid Mollaeefar, Andrea Bissoli, Silvio Ranise | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
MergePrint: Robust Fingerprinting against Merging Large Language Models Authors: Shojiro Yamabe, Tsubasa Takahashi, Futa Waseda, Koki Wataoka | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
SoK: Verifiable Cross-Silo FL Authors: Aleksei Korneev, Jan Ramon | Published: 2024-10-11 2024.10.11 2025.04.03 文献データベース
Time Traveling to Defend Against Adversarial Example Attacks in Image Classification Authors: Anthony Etim, Jakub Szefer | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース
Privately Learning from Graphs with Applications in Fine-tuning Large Language Models Authors: Haoteng Yin, Rongzhe Wei, Eli Chien, Pan Li | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース
Study of Attacks on the HHL Quantum Algorithm Authors: Yizhuo Tan, Hrvoje Kukina, Jakub Szefer | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース
APOLLO: A GPT-based tool to detect phishing emails and generate explanations that warn users Authors: Giuseppe Desolda, Francesco Greco, Luca Viganò | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース
Detecting Training Data of Large Language Models via Expectation Maximization Authors: Gyuwan Kim, Yang Li, Evangelia Spiliopoulou, Jie Ma, Miguel Ballesteros, William Yang Wang | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース
RealVul: Can We Detect Vulnerabilities in Web Applications with LLM? Authors: Di Cao, Yong Liao, Xiuwei Shang | Published: 2024-10-10 2024.10.10 2025.04.03 文献データベース