Timber! Poisoning Decision Trees

Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01

Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism

Authors: Noah Kader, Inwon Kang, Oshani Seneviratne | Published: 2024-10-01

An interdisciplinary exploration of trade-offs between energy, privacy and accuracy aspects of data

Authors: Pepijn de Reus, Kyra Dresen, Ana Oprescu, Kristina Irion, Ans Kolk | Published: 2024-09-30 | Updated: 2024-10-12

Robust LLM safeguarding via refusal feature adversarial training

Authors: Lei Yu, Virginie Do, Karen Hambardzumyan, Nicola Cancedda | Published: 2024-09-30 | Updated: 2025-03-20

Infighting in the Dark: Multi-Label Backdoor Attack in Federated Learning

Authors: Ye Li, Yanchao Zhao, Chengcheng Zhu, Jiale Zhang | Published: 2024-09-29 | Updated: 2025-03-22

Enhancing Robustness of Graph Neural Networks through p-Laplacian

Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27

System-Level Defense against Indirect Prompt Injection Attacks: An Information Flow Control Perspective

Authors: Fangzhou Wu, Ethan Cecchetti, Chaowei Xiao | Published: 2024-09-27 | Updated: 2024-10-10

An Adversarial Perspective on Machine Unlearning for AI Safety

Authors: Jakub Łucki, Boyi Wei, Yangsibo Huang, Peter Henderson, Florian Tramèr, Javier Rando | Published: 2024-09-26 | Updated: 2025-04-10

Weak-to-Strong Backdoor Attack for Large Language Models

Authors: Shuai Zhao, Leilei Gan, Zhongliang Guo, Xiaobao Wu, Luwei Xiao, Xiaoyu Xu, Cong-Duy Nguyen, Luu Anh Tuan | Published: 2024-09-26 | Updated: 2024-10-13

MoJE: Mixture of Jailbreak Experts, Naive Tabular Classifiers as Guard for Prompt Attacks

Authors: Giandomenico Cornacchia, Giulio Zizzo, Kieran Fraser, Muhammad Zaid Hameed, Ambrish Rawat, Mark Purcell | Published: 2024-09-26 | Updated: 2024-10-04