Search

Showing total 7,668 results

Search Constraints

Start Over You searched for: Topic computer science - machine learning Remove constraint Topic: computer science - machine learning Topic computer science - cryptography and security Remove constraint Topic: computer science - cryptography and security Database arXiv Remove constraint Database: arXiv
7,668 results

Search Results

1. Evaluations of Machine Learning Privacy Defenses are Misleading

2. Software Vulnerability Prediction in Low-Resource Languages: An Empirical Study of CodeBERT and ChatGPT

3. Efficient and Near-Optimal Noise Generation for Streaming Differential Privacy

4. Privacy-Preserving Statistical Data Generation: Application to Sepsis Detection

5. Differentially Private Federated Learning: Servers Trustworthiness, Estimation, and Statistical Inference

6. An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape

7. Advancing Recommender Systems by mitigating Shilling attacks

8. Guardians of the Quantum GAN

9. A Comparative Analysis of Adversarial Robustness for Quantum and Classical Machine Learning Models

10. On TinyML and Cybersecurity: Electric Vehicle Charging Infrastructure Use Case

11. zkLLM: Zero Knowledge Proofs for Large Language Models

12. CLAD: Robust Audio Deepfake Detection Against Manipulation Attacks with Contrastive Learning

13. Collaborative Heterogeneous Causal Inference Beyond Meta-analysis

14. A General Black-box Adversarial Attack on Graph-based Fake News Detectors

15. Automated Creation of Source Code Variants of a Cryptographic Hash Function Implementation Using Generative Pre-Trained Transformer Models

16. MISLEAD: Manipulating Importance of Selected features for Learning Epsilon in Evasion Attack Deception

17. Insufficient Statistics Perturbation: Stable Estimators for Private Least Squares

18. Perturbing Attention Gives You More Bang for the Buck: Subtle Imaging Perturbations That Efficiently Fool Customized Diffusion Models

19. Manipulating Recommender Systems: A Survey of Poisoning Attacks and Countermeasures

20. Talk Too Much: Poisoning Large Language Models under Token Limit

21. A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation

22. Federated Learning with Only Positive Labels by Exploring Label Correlations

23. Competition Report: Finding Universal Jailbreak Backdoors in Aligned LLMs

24. Poisoning Attacks on Federated Learning-based Wireless Traffic Prediction

25. AI-Generated Faces in the Real World: A Large-Scale Case Study of Twitter Profile Images

26. Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning

27. AdvPrompter: Fast Adaptive Adversarial Prompting for LLMs

28. Towards General Conceptual Model Editing via Adversarial Representation Engineering

29. Detecting Compromised IoT Devices Using Autoencoders with Sequential Hypothesis Testing

30. PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud

31. DNA: Differentially private Neural Augmentation for contact tracing

32. LEMDA: A Novel Feature Engineering Method for Intrusion Detection in IoT Systems

33. Security and Privacy Product Inclusion

34. The Instruction Hierarchy: Training LLMs to Prioritize Privileged Instructions

35. CyberSecEval 2: A Wide-Ranging Cybersecurity Evaluation Suite for Large Language Models

36. Towards Robust Real-Time Hardware-based Mobile Malware Detection using Multiple Instance Learning Formulation

37. LSP Framework: A Compensatory Model for Defeating Trigger Reverse Engineering via Label Smoothing Poisoning

38. PATE-TripleGAN: Privacy-Preserving Image Synthesis with Gaussian Differential Privacy

39. AED-PADA:Improving Generalizability of Adversarial Example Detection via Principal Adversarial Domain Adaptation

40. End-to-End Verifiable Decentralized Federated Learning

41. TrajDeleter: Enabling Trajectory Forgetting in Offline Reinforcement Learning Agents

42. Proteus: Preserving Model Confidentiality during Graph Optimizations

43. KDk: A Defense Mechanism Against Label Inference Attacks in Vertical Federated Learning

44. Privacy-Preserving UCB Decision Process Verification via zk-SNARKs

45. \copyright Plug-in Authorization for Human Content Copyright Protection in Text-to-Image Model

46. FedMID: A Data-Free Method for Using Intermediate Outputs as a Defense Mechanism Against Poisoning Attacks in Federated Learning

47. Exploring DNN Robustness Against Adversarial Attacks Using Approximate Multipliers

48. LMEraser: Large Model Unlearning through Adaptive Prompt Tuning

49. Confidential Federated Computations

50. Dynamic Frequency-Based Fingerprinting Attacks against Modern Sandbox Environments