Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks

Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08

FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning

Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08

A Weighted Byzantine Fault Tolerance Consensus Driven Trusted Multiple Large Language Models Network

Authors: Haoxiang Luo, Gang Sun, Yinqiu Liu, Dongcheng Zhao, Dusit Niyato, Hongfang Yu, Schahram Dustdar | Published: 2025-05-08

An Agent-Based Modeling Approach to Free-Text Keyboard Dynamics for Continuous Authentication

Authors: Roberto Dillon, Arushi | Published: 2025-05-08

Federated Learning for Cyber Physical Systems: A Comprehensive Survey

Authors: Minh K. Quan, Pubudu N. Pathirana, Mayuri Wijayasundara, Sujeeva Setunge, Dinh C. Nguyen, Christopher G. Brinton, David J. Love, H. Vincent Poor | Published: 2025-05-08

OBLIVIATE: Robust and Practical Machine Unlearning for Large Language Models

Authors: Xiaoyu Xu, Minxin Du, Qingqing Ye, Haibo Hu | Published: 2025-05-07

敵対的サンプルから守る、敵対的学習New

敵対的サンプルに対する対策技術の1つに、敵対的学習があります。本記事では、敵対的学習を用いて、どのように敵対的サンプルの影響を防ぐかを解説します。

Weaponizing Language Models for Cybersecurity Offensive Operations: Automating Vulnerability Assessment Report Validation; A Review Paper

Authors: Abdulrahman S Almuhaidib, Azlan Mohd Zain, Zalmiyah Zakaria, Izyan Izzati Kamsani, Abdulaziz S Almuhaidib | Published: 2025-05-07

AutoPatch: Multi-Agent Framework for Patching Real-World CVE Vulnerabilities

Authors: Minjae Seo, Wonwoo Choi, Myoungsung You, Seungwon Shin | Published: 2025-05-07

LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling

Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07