Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A comprehensive survey on poisoning attacks and countermeasures in machine learning
The prosperity of machine learning has been accompanied by increasing attacks on the
training process. Among them, poisoning attacks have become an emerging threat during …
training process. Among them, poisoning attacks have become an emerging threat during …
Generative adversarial networks: A survey toward private and secure applications
Generative Adversarial Networks (GANs) have promoted a variety of applications in
computer vision and natural language processing, among others, due to its generative …
computer vision and natural language processing, among others, due to its generative …
Extracting training data from diffusion models
Image diffusion models such as DALL-E 2, Imagen, and Stable Diffusion have attracted
significant attention due to their ability to generate high-quality synthetic images. In this work …
significant attention due to their ability to generate high-quality synthetic images. In this work …
Trustworthy llms: a survey and guideline for evaluating large language models' alignment
Ensuring alignment, which refers to making models behave in accordance with human
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
intentions [1, 2], has become a critical task before deploying large language models (LLMs) …
Propile: Probing privacy leakage in large language models
The rapid advancement and widespread use of large language models (LLMs) have raised
significant concerns regarding the potential leakage of personally identifiable information …
significant concerns regarding the potential leakage of personally identifiable information …
Towards unbounded machine unlearning
Deep machine unlearning is the problem of'removing'from a trained neural network a subset
of its training set. This problem is very timely and has many applications, including the key …
of its training set. This problem is very timely and has many applications, including the key …
Are diffusion models vulnerable to membership inference attacks?
Diffusion-based generative models have shown great potential for image synthesis, but
there is a lack of research on the security and privacy risks they may pose. In this paper, we …
there is a lack of research on the security and privacy risks they may pose. In this paper, we …
Fedfed: Feature distillation against data heterogeneity in federated learning
Federated learning (FL) typically faces data heterogeneity, ie, distribution shifting among
clients. Sharing clients' information has shown great potentiality in mitigating data …
clients. Sharing clients' information has shown great potentiality in mitigating data …
See through gradients: Image batch recovery via gradinversion
Training deep neural networks requires gradient estimation from data batches to update
parameters. Gradients per parameter are averaged over a set of data and this has been …
parameters. Gradients per parameter are averaged over a set of data and this has been …
Reconstructing training data from trained neural networks
Understanding to what extent neural networks memorize training data is an intriguing
question with practical and theoretical implications. In this paper we show that in some …
question with practical and theoretical implications. In this paper we show that in some …