Picture for Sergio Maffeis

Sergio Maffeis

HarmLevelBench: Evaluating Harm-Level Compliance and the Impact of Quantization on Model Alignment

Add code
Nov 11, 2024
Viaarxiv icon

Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation

Add code
Jan 18, 2024
Figure 1 for Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation
Figure 2 for Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation
Figure 3 for Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation
Figure 4 for Differentially Private and Adversarially Robust Machine Learning: An Empirical Evaluation
Viaarxiv icon

Elevating Defenses: Bridging Adversarial Training and Watermarking for Model Resilience

Add code
Jan 07, 2024
Viaarxiv icon

VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection

Add code
May 25, 2022
Figure 1 for VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Figure 2 for VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Figure 3 for VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Figure 4 for VulBERTa: Simplified Source Code Pre-Training for Vulnerability Detection
Viaarxiv icon

Certified Federated Adversarial Training

Add code
Dec 20, 2021
Figure 1 for Certified Federated Adversarial Training
Figure 2 for Certified Federated Adversarial Training
Figure 3 for Certified Federated Adversarial Training
Figure 4 for Certified Federated Adversarial Training
Viaarxiv icon

A Hybrid Graph Neural Network Approach for Detecting PHP Vulnerabilities

Add code
Dec 16, 2020
Viaarxiv icon

Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks

Add code
Nov 08, 2019
Figure 1 for Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks
Figure 2 for Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks
Figure 3 for Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks
Figure 4 for Intrusion Detection for Industrial Control Systems: Evaluation Analysis and Adversarial Attacks
Viaarxiv icon

Deep Latent Defence

Add code
Oct 09, 2019
Figure 1 for Deep Latent Defence
Figure 2 for Deep Latent Defence
Figure 3 for Deep Latent Defence
Figure 4 for Deep Latent Defence
Viaarxiv icon