Securing RAG: A Risk Assessment and Mitigation Framework

Authors: Lukas Ammann, Sara Ott, Christoph R. Landolt, Marco P. Lehmann | Published: 2025-05-13

MUBox: A Critical Evaluation Framework of Deep Machine Unlearning

Authors: Xiang Li, Bhavani Thuraisingham, Wenqi Wei | Published: 2025-05-13

Privacy-Preserving Analytics for Smart Meter (AMI) Data: A Hybrid Approach to Comply with CPUC Privacy Regulations

Authors: Benjamin Westrich | Published: 2025-05-13

Securing WiFi Fingerprint-based Indoor Localization Systems from Malicious Access Points

Authors: Fariha Tanjim Shifat, Sayma Sarwar Ela, Mosarrat Jahan | Published: 2025-05-12

SecReEvalBench: A Multi-turned Security Resilience Evaluation Benchmark for Large Language Models

Authors: Huining Cui, Wei Liu | Published: 2025-05-12

Security through the Eyes of AI: How Visualization is Shaping Malware Detection

Authors: Asmitha K. A., Matteo Brosolo, Serena Nicolazzo, Antonino Nocera, Vinod P., Rafidha Rehiman K. A., Muhammed Shafi K. P | Published: 2025-05-12

Private LoRA Fine-tuning of Open-Source LLMs with Homomorphic Encryption

Authors: Jordan Frery, Roman Bredehoft, Jakub Klemsa, Arthur Meyre, Andrei Stoian | Published: 2025-05-12

Comet: Accelerating Private Inference for Large Language Model by Predicting Activation Sparsity

Authors: Guang Yan, Yuhui Zhang, Zimu Guo, Lutan Zhao, Xiaojun Chen, Chen Wang, Wenhao Wang, Dan Meng, Rui Hou | Published: 2025-05-12

Securing Genomic Data Against Inference Attacks in Federated Learning Environments

Authors: Chetan Pathade, Shubham Patil | Published: 2025-05-12

One Trigger Token Is Enough: A Defense Strategy for Balancing Safety and Usability in Large Language Models

Authors: Haoran Gu, Handing Wang, Yi Mei, Mengjie Zhang, Yaochu Jin | Published: 2025-05-12