Abstract is missing.
- Modeling and Security Analysis of Attacks on Machine Learning SystemsAnoop Singhal. 1-2 [doi]
- Transformer-based Language Models and Homomorphic Encryption: An Intersection with BERT-tinyLorenzo Rovida, Alberto Leporati. 3-13 [doi]
- Legally Binding but Unfair? Towards Assessing Fairness of Privacy PoliciesVincent Freiberger, Erik Buchmann. 15-22 [doi]
- 1-Diffractor: Efficient and Utility-Preserving Text Obfuscation Leveraging Word-Level Metric Differential PrivacyStephen Meisenbacher, Maulik Chevli, Florian Matthes. 23-33 [doi]
- Review of Existing Methods for Generating and Detecting Fake and Partially Fake AudioAbdulazeez AlAli, George Theodorakopoulos 0001. 35-36 [doi]
- LLMs for Explainable Few-shot Deception DetectionDainis Boumber, Bryan E. Tuck, Rakesh M. Verma, Fatima Zahra Qachfar. 37-47 [doi]
- Evaluating Large Language Models for Real-World Vulnerability Repair in C/C++ CodeLan Zhang, Qingtian Zou, Anoop Singhal, Xiaoyan Sun, Peng Liu. 49-58 [doi]
- Domain Independent Deception Detection: Feature Sets, LIWC Efficacy, and Synthetic Data ChallengesCasey Hanks, Shanina Ko, Emily Nguyen, Rakesh M. Verma. 59-68 [doi]
- Privacy-Enhancing Technologies for AI Systems: A TutorialLiv Galliker d'Aliberti, Evan Gronberg, Joseph Kovba. 69-70 [doi]
- Machine Learning Training on Encrypted Data with TFHELuis Montero, Jordan Fréry, Celia Kherfallah, Roman Bredehoft, Andrei Stoian. 71-76 [doi]