Can Biases in ImageNet Models Explain Generalization?

Authors: Paul Gavrikov, Janis Keuper | Published: 2024-04-01

Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

Authors: Yuxin Wen, Leo Marchyok, Sanghyun Hong, Jonas Geiping, Tom Goldstein, Nicholas Carlini | Published: 2024-04-01

Machine Unlearning for Traditional Models and Large Language Models: A Short Survey

Authors: Yi Xu | Published: 2024-04-01

Enhancing Reasoning Capacity of SLM using Cognitive Enhancement

Authors: Jonathan Pan, Swee Liang Wong, Xin Wei Chia, Yidi Yuan | Published: 2024-04-01

An incremental hybrid adaptive network-based IDS in Software Defined Networks to detect stealth attacks

Authors: Abdullah H Alqahtani | Published: 2024-04-01

What is in Your Safe Data? Identifying Benign Data that Breaks Safety

Authors: Luxi He, Mengzhou Xia, Peter Henderson | Published: 2024-04-01 | Updated: 2024-08-20

Can LLMs get help from other LLMs without revealing private information?

Authors: Florian Hartmann, Duc-Hieu Tran, Peter Kairouz, Victor Cărbune, Blaise Aguera y Arcas | Published: 2024-04-01 | Updated: 2024-04-02

On Large Language Models’ Hallucination with Regard to Known Facts

Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28

A Backdoor Approach with Inverted Labels Using Dirty Label-Flipping Attacks

Authors: Orson Mengara | Published: 2024-03-29 | Updated: 2024-04-07

Detecting Financial Bots on the Ethereum Blockchain

Authors: Thomas Niedermayer, Pietro Saggese, Bernhard Haslhofer | Published: 2024-03-28 | Updated: 2025-01-02