Picture for Shang Shang

Shang Shang

Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent

Add code
May 07, 2024
Figure 1 for Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent
Figure 2 for Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent
Figure 3 for Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent
Figure 4 for Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent
Viaarxiv icon

The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy

Add code
Sep 24, 2014
Figure 1 for The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy
Figure 2 for The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy
Figure 3 for The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy
Viaarxiv icon

A Random Walk Based Model Incorporating Social Information for Recommendations

Add code
May 17, 2013
Figure 1 for A Random Walk Based Model Incorporating Social Information for Recommendations
Figure 2 for A Random Walk Based Model Incorporating Social Information for Recommendations
Figure 3 for A Random Walk Based Model Incorporating Social Information for Recommendations
Figure 4 for A Random Walk Based Model Incorporating Social Information for Recommendations
Viaarxiv icon

Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models

Add code
May 17, 2013
Figure 1 for Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models
Figure 2 for Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models
Viaarxiv icon