Workshop on Artificial Intelligence System with Confidential Computing (AISCC 2024) Accepted Papers

Find the papers accepted for presentation at the upcoming Artificial Intelligence System with Confidential Computing (AISCC 2024) Workshop. Each paper will be allotted 8 minutes for presentation. Note that the papers are listed in alphabetical order on this page, however, the workshop will follow the sequence listed on the Program page for presentations. We encourage attendees to review the schedule in advance to ensure they don’t miss any presentations of interest.

Aligning Confidential Computing with Cloud-native ML Platforms

Angelo Ruocco, Chris Porter, Claudio Carvalho, Daniele Buono, Derren Dunn, Hubertus Franke, James Bottomley,...

More Details

Benchmarking transferable adversarial attacks

Zhibo Jin (The University of Sydney), Jiayu Zhang (Suzhou Yierqi), Zhiyu Zhu, Huaming Chen...

More Details

Differentially Private Dataset Condensation

Tianhang Zheng (University of Missouri-Kansas City), Baochun Li (University of Toronto)

More Details

Enhancing Security Event Detection on Twitter with Graph-based...

Jian Cui (Indiana University Bloomington)

More Details

Exploring the Influence of Prompts in LLMs for...

Weiheng Bai (University of Minnesota), Qiushi Wu (IBM Research), Kefu Wu, Kangjie Lu (University...

More Details

Facilitating Threat Modeling by Leveraging Large Language Models

Isra Elsharef, Zhen Zeng (University of Wisconsin-Milwaukee), Zhongshu Gu (IBM Research)

More Details

Heterogeneous Graph Pre-training Based Model for Secure and...

Xurui Li (Fudan University), Xin Shan (Bank of Shanghai), Wenhao Yin (Shanghai Saic Finance...

More Details

PANDORA: Jailbreak GPTs by Retrieval Augmented Generation Poisoning

Gelei Deng, Yi Liu (Nanyang Technological University), Yuekang Li (The University of New South...

More Details

Research on the Reliability and Fairness of Opinion...

Zhuo Chen, Jiawei Liu, Haotan Liu (Wuhan University)

More Details

Strengthening Privacy in Robust Federated Learning through Secure...

Tianyue Chu, Devriş İşler (IMDEA Networks Institute & Universidad Carlos III de Madrid), Nikolaos...

More Details

WIP: Auditing Artist Style Pirate in Text-to-image Generation...

Linkang Du (Zhejiang University), Zheng Zhu (Zhejiang University), Min Chen (CISPA Helmholtz Center for...

More Details

WIP: Towards a Certifiably Robust Defense for Multi-label...

Dennis Jacob, Chong Xiang, Prateek Mittal (Princeton University)

More Details