Showing 261–280 of 468 results
/ Date/ Name
Feb 6, 2025How Vulnerable Is My Learned Policy? Universal Adversarial Perturbation Attacks On Modern Behavior Cloning PoliciesFeb 4, 2025Adversarial ML Problems Are Getting Harder to Solve and to EvaluateFeb 1, 2025Defense Against the Dark Prompts: Mitigating Best-of-N Jailbreaking with Prompt EvaluationJan 22, 2025Practical quantum federated learning and its experimental demonstrationJan 22, 2025Towards Robust Multi-tab Website FingerprintingNov 15, 2024Exploiting Cross-Layer Vulnerabilities: Off-Path Attacks on the TCP/IP Protocol SuiteNov 9, 2024IDU-Detector: A Synergistic Framework for Robust Masquerader Attack DetectionNov 7, 2024Privacy Leakage via Output Label Space and Differentially Private Continual LearningOct 23, 2024Towards Understanding the Fragility of Multilingual LLMs against Fine-Tuning AttacksOct 17, 2024Persistent Pre-Training Poisoning of LLMsOct 15, 2024The Age of DDoScovery: An Empirical Comparison of Industry and Academic DDoS AssessmentsOct 11, 2024Quantum Operating System Support for Quantum Trusted Execution EnvironmentsOct 4, 2024On the Equivalence between Classical Position Verification and Certified RandomnessOct 4, 2024Gradient-based Jailbreak Images for Multimodal Fusion ModelsSep 26, 2024An Adversarial Perspective on Machine Unlearning for AI SafetySep 26, 2024Multi-Designated Detector Watermarking for Language ModelsSep 17, 2024An Anti-disguise Authentication System Using the First Impression of Avatar in MetaverseJun 18, 2024DCS Chain: A Flexible Private Blockchain SystemJun 17, 2024Adversarial Perturbations Cannot Reliably Protect Artists From Generative AIJun 12, 2024Dataset and Lessons Learned from the 2024 SaTML LLM Capture-the-Flag Competition