Showing 301–320 of 468 results
/ Date/ Name
Dec 19, 2023EncryIP: A Practical Encryption-Based Framework for Model Intellectual Property ProtectionNov 30, 2023Improving the Robustness of Quantized Deep Neural Networks to White-Box Attacks using Stochastic Quantization and Information-Theoretic Ensemble TrainingNov 27, 2023Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control PerspectiveNov 24, 2023Universal Jailbreak Backdoors from Poisoned Human FeedbackNov 20, 2023Assessing Prompt Injection Risks in 200+ Custom GPTsNov 16, 2023RLHFPoison: Reward Poisoning Attack for Reinforcement Learning with Human Feedback in Large Language ModelsNov 13, 2023Enhancing NAC-ABE to Support Access Control for mHealth Applications and BeyondNov 7, 2023Identifying and Mitigating Vulnerabilities in LLM-Integrated ApplicationsOct 30, 2023Generated Distributions Are All You Need for Membership Inference Attacks Against Generative ModelsOct 24, 2023SoK: Memorization in General-Purpose Large Language ModelsOct 12, 2023Differentially Private Non-convex Learning for Multi-layer Neural NetworksOct 5, 2023SIFT -- File Fragment Classification Without MetadataSep 22, 2023Expressive variational quantum circuits provide inherent privacy in federated learningSep 20, 2023It's Simplex! Disaggregating Measures to Improve Certified RobustnessSep 15, 2023Local Differential Privacy in Graph Neural Networks: a Reconstruction ApproachAug 17, 2023Experimental quantum e-commerceAug 12, 2023On the Security Bootstrapping in Named Data NetworkingAug 6, 2023WASMixer: Binary Obfuscation for WebAssemblyJul 24, 2023PUMA: Secure Inference of LLaMA-7B in Five MinutesJul 18, 2023Runtime Stealthy Perception Attacks against DNN-based Adaptive Cruise Control Systems