Search Results for author: Shang Shang

Found 4 papers, 0 papers with code

Can LLMs Deeply Detect Complex Malicious Queries? A Framework for Jailbreaking via Obfuscating Intent

no code implementations6 May 2024 Shang Shang, Xinqiang Zhao, Zhongjiang Yao, Yepeng Yao, Liya Su, Zijing Fan, Xiaodan Zhang, Zhengwei Jiang

To demonstrate and address the underlying maliciousness, we propose a theoretical hypothesis and analytical approach, and introduce a new black-box jailbreak attack methodology named IntentObfuscator, exploiting this identified flaw by obfuscating the true intentions behind user prompts. This approach compels LLMs to inadvertently generate restricted content, bypassing their built-in content security measures.

The Application of Differential Privacy for Rank Aggregation: Privacy and Accuracy

no code implementations24 Sep 2014 Shang Shang, Tiance Wang, Paul Cuff, Sanjeev Kulkarni

The potential risk of privacy leakage prevents users from sharing their honest opinions on social platforms.

Wisdom of the Crowd: Incorporating Social Influence in Recommendation Models

no code implementations3 Aug 2012 Shang Shang, Pan Hui, Sanjeev R. Kulkarni, Paul W. Cuff

In this paper, we propose two recommendation models, for individuals and for groups respectively, based on social contagion and social influence network theory.

Collaborative Filtering Decision Making +1

Cannot find the paper you are looking for? You can Submit a new open access paper.