Pattern-Based File and Data Access with Python Glob: A Comprehensive Guide for Computational Research
Sidney Shapiro
https://arxiv.org/abs/2509.08843 https://
Where are GIScience Faculty Hired from? Analyzing Faculty Mobility and Research Themes Through Hiring Networks
Yanbing Chen, Jonathan Nelson, Bing Zhou, Ryan Zhenqi Zhou, Shan Ye, Haokun Liu, Zhining Gu, Armita Kar, Hoeyun Kwon, Pengyu Chen, Maoran Sun, Yuhao Kang
https://arxiv.org/abs/2508.09043
DiffractGPT: Atomic Structure Determination from X-ray Diffraction Patterns using Generative Pre-trained Transformer
Kamal Choudhary
https://arxiv.org/abs/2508.08349 https://
ForTIFAI: Fending Off Recursive Training Induced Failure for AI Models
Soheil Zibakhsh Shabgahi, Pedram Aghazadeh, Azalia Mirhosseini, Farinaz Koushanfar
https://arxiv.org/abs/2509.08972
Low Resource Reconstruction Attacks Through Benign Prompts
Sol Yarkoni, Roi Livni
https://arxiv.org/abs/2507.07947 https://arxiv.org/pdf/2507.07947 https://arxiv.org/html/2507.07947
arXiv:2507.07947v1 Announce Type: new
Abstract: The recent advances in generative models such as diffusion models have raised several risks and concerns related to privacy, copyright infringements and data stewardship. To better understand and control the risks, various researchers have created techniques, experiments and attacks that reconstruct images, or part of images, from the training set. While these techniques already establish that data from the training set can be reconstructed, they often rely on high-resources, excess to the training set as well as well-engineered and designed prompts.
In this work, we devise a new attack that requires low resources, assumes little to no access to the actual training set, and identifies, seemingly, benign prompts that lead to potentially-risky image reconstruction. This highlights the risk that images might even be reconstructed by an uninformed user and unintentionally. For example, we identified that, with regard to one existing model, the prompt ``blue Unisex T-Shirt'' can generate the face of a real-life human model. Our method builds on an intuition from previous works which leverages domain knowledge and identifies a fundamental vulnerability that stems from the use of scraped data from e-commerce platforms, where templated layouts and images are tied to pattern-like prompts.
toXiv_bot_toot
TrEnv: Transparently Share Serverless Execution Environments Across Different Functions and Nodes
Jialiang Huang, Teng Ma, Zheng Liu, Sixing Lin, Kang Chen, Jinlei Jiang, Xia Liao, Yingdi Shan, Yongwei Wu, Ning Zhang, Mengting Lu, Tao Ma, Haifeng Gong, Mingxing Zhang
https://arxiv.org/abs/2509.09525
Signals in the Noise: Decoding Unexpected Engagement Patterns on Twitter
Yulin Yu, Houming Chen, Daniel Romero, Paramveer S. Dhillon
https://arxiv.org/abs/2509.08128 https://
Replaced article(s) found for cs.NI. https://arxiv.org/list/cs.NI/new
[1/1]:
- A Deep Learning Based Resource Allocator for Communication Networks with Dynamic User Utility Dem...
Pourya Behmandpoor, Mark Eisen, Panagiotis Patrinos, Marc Moonen
DiffVolume: Diffusion Models for Volume Generation in Limit Order Books
Zhuohan Wang, Carmine Ventre
https://arxiv.org/abs/2508.08698 https://arxiv.org/pdf…
Unveiling Biological Models Through Turing Patterns
Yuhan Li, Hongyu Liu, Catharine W. K. Lo
https://arxiv.org/abs/2509.07458 https://arxiv.org/pdf/2509.07…