The evolution of distributed systems for graph neural networks and their origin in graph processing and deep learning: A survey
Graph neural networks (GNNs) are an emerging research field. This specialized deep
neural network architecture is capable of processing graph structured data and bridges the …
neural network architecture is capable of processing graph structured data and bridges the …
Blockchain-based federated learning for securing internet of things: A comprehensive survey
The Internet of Things (IoT) ecosystem connects physical devices to the internet, offering
significant advantages in agility, responsiveness, and potential environmental benefits. The …
significant advantages in agility, responsiveness, and potential environmental benefits. The …
Extracting training data from diffusion models
Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted
significant attention due to their ability to generate high-quality synthetic images. In this work …
significant attention due to their ability to generate high-quality synthetic images. In this work …
Regulating ChatGPT and other large generative AI models
Large generative AI models (LGAIMs), such as ChatGPT, GPT-4 or Stable Diffusion, are
rapidly transforming the way we communicate, illustrate, and create. However, AI regulation …
rapidly transforming the way we communicate, illustrate, and create. However, AI regulation …
Propile: Probing privacy leakage in large language models
The rapid advancement and widespread use of large language models (LLMs) have raised
significant concerns regarding the potential leakage of personally identifiable information …
significant concerns regarding the potential leakage of personally identifiable information …
Quantifying memorization across neural language models
Large language models (LMs) have been shown to memorize parts of their training data,
and when prompted appropriately, they will emit the memorized training data verbatim. This …
and when prompted appropriately, they will emit the memorized training data verbatim. This …
Scalable extraction of training data from (production) language models
This paper studies extractable memorization: training data that an adversary can efficiently
extract by querying a machine learning model without prior knowledge of the training …
extract by querying a machine learning model without prior knowledge of the training …
Membership inference attacks from first principles
A membership inference attack allows an adversary to query a trained machine learning
model to predict whether or not a particular example was contained in the model's training …
model to predict whether or not a particular example was contained in the model's training …
Shifting machine learning for healthcare from development to deployment and from models to data
In the past decade, the application of machine learning (ML) to healthcare has helped drive
the automation of physician tasks as well as enhancements in clinical capabilities and …
the automation of physician tasks as well as enhancements in clinical capabilities and …
Adversarial machine learning for network intrusion detection systems: A comprehensive survey
Network-based Intrusion Detection System (NIDS) forms the frontline defence against
network attacks that compromise the security of the data, systems, and networks. In recent …
network attacks that compromise the security of the data, systems, and networks. In recent …