Showing 321–340 of 468 results
/ Date/ Name
Jul 12, 2023SoK: Comparing Different Membership Inference Attacks with a Comprehensive BenchmarkJun 27, 2023[Re] Double Sampling Randomized SmoothingJun 2, 2023PassGPT: Password Modeling and (Guided) Generation with Large Language ModelsJun 2, 2023Proxy Re-encryption based Fair Trade Protocol for Digital Goods Transactions via Smart ContractsMay 22, 2023Adversarial Nibbler: A Data-Centric Challenge for Improving the Safety of Text-to-Image ModelsMay 22, 2023FGAM:Fast Adversarial Malware Generation Method Based on Gradient SignMay 16, 2023Security Evaluation of Thermal Covert-channels on SmartSSDsMar 31, 2023PEOPL: Characterizing Privately Encoded Open Datasets with Public LabelsMar 31, 2023Pentimento: Data Remanence in Cloud FPGAsMar 26, 2023Experimental quantum secret sharing based on phase encoding of coherent statesMar 24, 2023How many dimensions are required to find an adversarial example?Mar 21, 2023Manipulating Transfer Learning for Property InferenceMar 21, 2023Phase-Matching Quantum Key Distribution without Intensity ModulationMar 11, 2023Approaching Shannon's One-Time Pad: Metrics, Architectures, and Enabling TechnologiesFeb 27, 2023Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-AppFeb 2, 2023On the Efficacy of Differentially Private Few-shot Image ClassificationJan 25, 2023BDMMT: Backdoor Sample Detection for Language Models through Model Mutation TestingDec 21, 2022SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine LearningDec 10, 2022Adore: Differentially Oblivious Relational Database OperatorsDec 9, 2022SoK: MEV Countermeasures: Theory and Practice