A toolkit for assessing the safety of advanced language models.
― 5 min read
Cutting edge science explained simply
A toolkit for assessing the safety of advanced language models.
― 5 min read
Investigating vulnerabilities in audio watermarking methods against real-world threats.
― 7 min read
A look at kernel safety methods to combat advanced attacks like Spectre.
― 6 min read
A new digital signature system improves speed and security in data center applications.
― 5 min read
A method combining SGD and privacy techniques for effective data analysis.
― 6 min read
Examining strategies to combat dark pooling in digital ad spaces.
― 6 min read
Examining the Rowhammer flaw and its implications for data security.
― 7 min read
NutNet enhances object detection systems by effectively identifying adversarial patches.
― 7 min read
Discover how private quantum computing can protect sensitive data during complex calculations.
― 5 min read
Investigating the security flaws in Memory Tagging Extension and speculative execution attacks.
― 6 min read
Examining the security risks and solutions for emerging AI assistant technologies.
― 6 min read
A fresh method for creating images from text using specialized models.
― 5 min read
This research explores methods to learn shallow quantum circuits despite noise.
― 6 min read
A new watermarking method aids in identifying synthetic tabular data.
― 5 min read
A look into how propaganda spreads on Telegram during conflicts.
― 6 min read
Competition reveals vulnerabilities and defenses in language model security.
― 3 min read
A new framework for analyzing data streams while ensuring user privacy.
― 5 min read
Exploring privacy threats in image processing using diffusion models and leaked gradients.
― 7 min read
Analyzing data privacy through Bayesian inference with constraints.
― 6 min read
Exploring methods to protect personal images from AI misuse.
― 6 min read
This article discusses a new method to improve robustness against adversarial attacks in image classification.
― 6 min read
Examining security risks in mmWave networks utilizing simultaneous wireless information and power transfer.
― 6 min read
A study on improving model extraction techniques for deep learning security.
― 6 min read
A new approach to enhance homomorphic encryption processing speeds.
― 7 min read
This paper introduces a framework to evaluate vulnerabilities in large language models.
― 3 min read
Learn how target unlearning safeguards privacy by allowing models to forget specific information.
― 5 min read
A new method to verify machine unlearning effectively and securely.
― 7 min read
This article discusses feature unlearning and its impact on privacy and fairness in machine learning.
― 6 min read
This article explores the impact of data poisoning on language model alignment.
― 6 min read
Artists face risks as new technologies mimic their unique styles.
― 6 min read
P3GNN enhances APT detection while protecting data privacy in SDN networks.
― 6 min read
Blending traditional clustering methods with privacy protections using differential privacy.
― 6 min read
Learn how backdoor attacks threaten machine learning systems and methods to defend against them.
― 6 min read
A method to maintain privacy while sharing urban traffic statistics.
― 5 min read
New methods enhance predictions by focusing on code functionality instead of variable names.
― 6 min read
A framework to improve APT detection while protecting privacy.
― 5 min read
LDMeta enhances privacy and efficiency in distributed learning methods.
― 6 min read
The study examines how influencer ads shape VPN perceptions and online safety beliefs.
― 5 min read
Exploring the safety challenges posed by adversarial attacks on multimodal agents.
― 6 min read
LLMs assist human raters in effectively identifying harmful online content.
― 5 min read