Search

Your search keyword '"Geiping, Jonas"' showing total 170 results

Search Constraints

Start Over You searched for: Author "Geiping, Jonas" Remove constraint Author: "Geiping, Jonas"
170 results on '"Geiping, Jonas"'

Search Results

1. A Realistic Threat Model for Large Language Model Jailbreaks

2. Efficiently Dispatching Flash Attention For Partially Filled Attention Masks

3. Be like a Goldfish, Don't Memorize! Mitigating Memorization in Generative LLMs

4. AI Risk Management Should Incorporate Both Safety and Security

5. Transformers Can Do Arithmetic with the Right Embeddings

6. LMD3: Language Model Data Density Dependence

7. Measuring Style Similarity in Diffusion Models

8. Privacy Backdoors: Enhancing Membership Inference through Poisoning Pre-trained Models

9. Generating Potent Poisons and Backdoors from Scratch with Guided Diffusion

10. What do we learn from inverting CLIP models?

11. Coercing LLMs to do and reveal (almost) anything

12. Spotting LLMs With Binoculars: Zero-Shot Detection of Machine-Generated Text

13. Object Recognition as Next Token Prediction

14. A Performance-Driven Benchmark for Feature Selection in Tabular Deep Learning

15. A Simple and Efficient Baseline for Data Attribution on Images

16. Towards Possibilities & Impossibilities of AI-generated Text Detection: A Survey

17. NEFTune: Noisy Embeddings Improve Instruction Finetuning

18. Baseline Defenses for Adversarial Attacks Against Aligned Language Models

19. Augmenters at SemEval-2023 Task 1: Enhancing CLIP in Handling Compositionality and Ambiguity for Zero-Shot Visual WSD through Prompt Augmentation and Text-To-Image Diffusion

20. Seeing in Words: Learning to Classify through Language Bottlenecks

21. On the Exploitability of Instruction Tuning

22. Bring Your Own Data! Self-Supervised Evaluation for Large Language Models

23. On the Reliability of Watermarks for Large Language Models

24. Understanding and Mitigating Copying in Diffusion Models

25. Tree-Ring Watermarks: Fingerprints for Diffusion Images that are Invisible and Robust

26. What Can We Learn from Unlearnable Datasets?

27. A Cookbook of Self-Supervised Learning

28. JPEG Compressed Images Can Bypass Protections Against AI Editing

29. Universal Guidance for Diffusion Models

30. Hard Prompts Made Easy: Gradient-Based Discrete Optimization for Prompt Tuning and Discovery

31. A Watermark for Large Language Models

32. Cramming: Training a Language Model on a Single GPU in One Day

33. Diffusion Art or Digital Forgery? Investigating Data Replication in Diffusion Models

34. K-SAM: Sharpness-Aware Minimization at the Speed of SGD

35. Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

36. Thinking Two Moves Ahead: Anticipating Other Users Improves Backdoor Attacks in Federated Learning

37. How Much Data Are Augmentations Worth? An Investigation into Scaling Laws, Invariance, and Implicit Regularization

38. A Simple Strategy to Provable Invariance via Orbit Mapping

39. Cold Diffusion: Inverting Arbitrary Image Transforms Without Noise

40. Autoregressive Perturbations for Data Poisoning

41. Poisons that are learned faster are more effective

42. Fishing for User Data in Large-Batch Federated Learning via Gradient Magnification

43. Decepticons: Corrupted Transformers Breach Privacy in Federated Learning for Language Models

44. Robbing the Fed: Directly Obtaining Private Data in Federated Learning with Modified Models

45. Stochastic Training is Not Necessary for Generalization

46. Is Differentiable Architecture Search truly a One-Shot Method?

47. Adversarial Examples Make Strong Poisons

48. Training or Architecture? How to Incorporate Invariance in Neural Networks

49. DP-InstaHide: Provably Defusing Poisoning and Backdoor Attacks with Differentially Private Data Augmentations

50. What Doesn't Kill You Makes You Robust(er): How to Adversarially Train against Data Poisoning

Catalog

Books, media, physical & digital resources