Tootfinder

Opt-in global Mastodon full text search. Join the index!

No exact results. Similar results found.
@arXiv_csSE_bot@mastoxiv.page
2025-09-12 08:07:59

Pattern-Based File and Data Access with Python Glob: A Comprehensive Guide for Computational Research
Sidney Shapiro
arxiv.org/abs/2509.08843

@arXiv_csHC_bot@mastoxiv.page
2025-08-13 09:28:52

Where are GIScience Faculty Hired from? Analyzing Faculty Mobility and Research Themes Through Hiring Networks
Yanbing Chen, Jonathan Nelson, Bing Zhou, Ryan Zhenqi Zhou, Shan Ye, Haokun Liu, Zhining Gu, Armita Kar, Hoeyun Kwon, Pengyu Chen, Maoran Sun, Yuhao Kang
arxiv.org/abs/2508.09043

@arXiv_condmatmtrlsci_bot@mastoxiv.page
2025-08-13 08:00:22

DiffractGPT: Atomic Structure Determination from X-ray Diffraction Patterns using Generative Pre-trained Transformer
Kamal Choudhary
arxiv.org/abs/2508.08349

@arXiv_csAI_bot@mastoxiv.page
2025-09-12 07:31:39

ForTIFAI: Fending Off Recursive Training Induced Failure for AI Models
Soheil Zibakhsh Shabgahi, Pedram Aghazadeh, Azalia Mirhosseini, Farinaz Koushanfar
arxiv.org/abs/2509.08972

@arXiv_csLG_bot@mastoxiv.page
2025-07-11 10:23:01

Low Resource Reconstruction Attacks Through Benign Prompts
Sol Yarkoni, Roi Livni
arxiv.org/abs/2507.07947 arxiv.org/pdf/2507.07947 arxiv.org/html/2507.07947
arXiv:2507.07947v1 Announce Type: new
Abstract: The recent advances in generative models such as diffusion models have raised several risks and concerns related to privacy, copyright infringements and data stewardship. To better understand and control the risks, various researchers have created techniques, experiments and attacks that reconstruct images, or part of images, from the training set. While these techniques already establish that data from the training set can be reconstructed, they often rely on high-resources, excess to the training set as well as well-engineered and designed prompts.
In this work, we devise a new attack that requires low resources, assumes little to no access to the actual training set, and identifies, seemingly, benign prompts that lead to potentially-risky image reconstruction. This highlights the risk that images might even be reconstructed by an uninformed user and unintentionally. For example, we identified that, with regard to one existing model, the prompt ``blue Unisex T-Shirt'' can generate the face of a real-life human model. Our method builds on an intuition from previous works which leverages domain knowledge and identifies a fundamental vulnerability that stems from the use of scraped data from e-commerce platforms, where templated layouts and images are tied to pattern-like prompts.
toXiv_bot_toot

@arXiv_csDC_bot@mastoxiv.page
2025-09-12 08:59:19

TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes
Jialiang Huang, Teng Ma, Zheng Liu, Sixing Lin, Kang Chen, Jinlei Jiang, Xia Liao, Yingdi Shan, Yongwei Wu, Ning Zhang, Mengting Lu, Tao Ma, Haifeng Gong, Mingxing Zhang
arxiv.org/abs/2509.09525

@arXiv_csSI_bot@mastoxiv.page
2025-09-11 07:55:32

Signals in the Noise: Decoding Unexpected Engagement Patterns on Twitter
Yulin Yu, Houming Chen, Daniel Romero, Paramveer S. Dhillon
arxiv.org/abs/2509.08128

@arXiv_csNI_bot@mastoxiv.page
2025-08-12 16:24:04

Replaced article(s) found for cs.NI. arxiv.org/list/cs.NI/new
[1/1]:
- A Deep Learning Based Resource Allocator for Communication Networks with Dynamic User Utility Dem...
Pourya Behmandpoor, Mark Eisen, Panagiotis Patrinos, Marc Moonen

@arXiv_qfinTR_bot@mastoxiv.page
2025-08-13 08:35:02

DiffVolume: Diffusion Models for Volume Generation in Limit Order Books
Zhuohan Wang, Carmine Ventre
arxiv.org/abs/2508.08698 arxiv.org/pdf…

@arXiv_mathAP_bot@mastoxiv.page
2025-09-10 09:23:51

Unveiling Biological Models Through Turing Patterns
Yuhan Li, Hongyu Liu, Catharine W. K. Lo
arxiv.org/abs/2509.07458 arxiv.org/pdf/2509.07…