文献データベース

Attention Tracker: Detecting Prompt Injection Attacks in LLMs

Authors: Kuo-Han Hung, Ching-Yun Ko, Ambrish Rawat, I-Hsin Chung, Winston H. Hsu, Pin-Yu Chen | Published: 2024-11-01 | Updated: 2025-04-23
インダイレクトプロンプトインジェクション
大規模言語モデル
注意メカニズム

Efficient Model Compression for Bayesian Neural Networks

Authors: Diptarka Saha, Zihe Liu, Feng Liang | Published: 2024-11-01
スパースモデル
モデル性能評価
最適化問題

Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers

Authors: Lam Nguyen Tung, Steven Cho, Xiaoning Du, Neelofar Neelofar, Valerio Terragni, Stefano Ruberto, Aldeida Aleti | Published: 2024-10-30 | Updated: 2025-04-08
XAI(説明可能なAI)
モデル性能評価
信頼性分析

CausAdv: A Causal-based Framework for Detecting Adversarial Examples

Authors: Hichem Debbi | Published: 2024-10-29
フレームワーク
敵対的サンプル

Privacy-Preserving Dynamic Assortment Selection

Authors: Young Hyun Cho, Will Wei Sun | Published: 2024-10-29
プライバシー保護
プライバシー保護手法
最適化問題

Resilience in Knowledge Graph Embeddings

Authors: Arnab Sharma, N'Dah Jean Kouagou, Axel-Cyrille Ngonga Ngomo | Published: 2024-10-28
メンバーシップ推論
防御手法

CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models

Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21
サイバー脅威インテリジェンス
プロンプトリーキング
透かし技術

Integrating uncertainty quantification into randomized smoothing based robustness guarantees

Authors: Sina Däubener, Kira Maag, David Krueger, Asja Fischer | Published: 2024-10-27
敵対的サンプル
等価性評価

On the Geometry of Regularization in Adversarial Training: High-Dimensional Asymptotics and Generalization Bounds

Authors: Matteo Vilucchio, Nikolaos Tsilivis, Bruno Loureiro, Julia Kempe | Published: 2024-10-21
収束分析
敵対的訓練

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?

Authors: Shang Wang, Tianqing Zhu, Dayong Ye, Wanlei Zhou | Published: 2024-10-20 | Updated: 2025-10-13
RAG
RAGへのポイズニング攻撃
プライバシー保護技術