文献データベース

Inspection and Control of Self-Generated-Text Recognition Ability in Llama3-8b-Instruct

Authors: Christopher Ackerman, Nina Panickssery | Published: 2024-10-02 | Updated: 2025-01-25
AIによる出力の識別
プロンプティング戦略
自己認識モデル

Impact of White-Box Adversarial Attacks on Convolutional Neural Networks

Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02
モデル性能評価
攻撃手法
敵対的サンプル

Adaptively Private Next-Token Prediction of Large Language Models

Authors: James Flemings, Meisam Razaviyayn, Murali Annavaram | Published: 2024-10-02
プライバシー保護
プライバシー保護手法
プライバシー手法

Social Media Authentication and Combating Deepfakes using Semi-fragile Invisible Image Watermarking

Authors: Aakash Varma Nadimpalli, Ajita Rattani | Published: 2024-10-02
ウォーターマーキング
透かしの耐久性
透かし評価

On Using Certified Training towards Empirical Robustness

Authors: Alessandro De Palma, Serge Durand, Zakaria Chihani, François Terrier, Caterina Urban | Published: 2024-10-02 | Updated: 2025-03-24
敵対的サンプル
正則化

Machine Learning-Assisted Intrusion Detection for Enhancing Internet of Things Security

Authors: Mona Esmaeili, Morteza Rahimi, Hadise Pishdast, Dorsa Farahmandazad, Matin Khajavi, Hadi Jabbari Saray | Published: 2024-10-01 | Updated: 2024-10-06
サイバーセキュリティ
ネットワーク脅威検出

Empirical Perturbation Analysis of Linear System Solvers from a Data Poisoning Perspective

Authors: Yixin Liu, Arielle Carr, Lichao Sun | Published: 2024-10-01
バックドア攻撃
ポイズニング
線形ソルバー

Timber! Poisoning Decision Trees

Authors: Stefano Calzavara, Lorenzo Cazzaro, Massimo Vettori | Published: 2024-10-01
バックドア攻撃
ポイズニング

Enhancing Web Spam Detection through a Blockchain-Enabled Crowdsourcing Mechanism

Authors: Noah Kader, Inwon Kang, Oshani Seneviratne | Published: 2024-10-01
フィッシング検出

An interdisciplinary exploration of trade-offs between energy, privacy and accuracy aspects of data

Authors: Pepijn de Reus, Kyra Dresen, Ana Oprescu, Kristina Irion, Ans Kolk | Published: 2024-09-30 | Updated: 2024-10-12
プライバシー保護
プライバシー手法