AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration Authors: Andy Zhou, Kevin Wu, Francesco Pinto, Zhaorun Chen, Yi Zeng, Yu Yang, Shuang Yang, Sanmi Koyejo, James Zou, Bo Li | Published: 2025-03-20 Error HandlingText Generation MethodTest Case Generation 2025.03.20 2025.05.12 Literature Database
Towards Understanding the Safety Boundaries of DeepSeek Models: Evaluation and Findings Authors: Zonghao Ying, Guangyi Zheng, Yongxin Huang, Deyue Zhang, Wenxin Zhang, Quanchen Zou, Aishan Liu, Xianglong Liu, Dacheng Tao | Published: 2025-03-19 Prompt InjectionLarge Language ModelAttack Method 2025.03.19 2025.05.12 Literature Database
Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 Privacy Protection MethodPrompt leakingDeep Learning 2025.03.19 2025.05.12 Literature Database
Temporal Context Awareness: A Defense Framework Against Multi-turn Manipulation Attacks on Large Language Models Authors: Prashant Kulkarni, Assaf Namer | Published: 2025-03-18 Prompt InjectionPrompt leakingAttack Method 2025.03.18 2025.05.12 Literature Database
Personalized Attacks of Social Engineering in Multi-turn Conversations — LLM Agents for Simulation and Detection Authors: Tharindu Kumarage, Cameron Johnson, Jadie Adams, Lin Ai, Matthias Kirchner, Anthony Hoogs, Joshua Garland, Julia Hirschberg, Arslan Basharat, Huan Liu | Published: 2025-03-18 AlignmentSocial Engineering AttackAttack Method 2025.03.18 2025.05.12 Literature Database
Anomaly-Flow: A Multi-domain Federated Generative Adversarial Network for Distributed Denial-of-Service Detection Authors: Leonardo Henrique de Melo, Gustavo de Carvalho Bertoli, Michele Nogueira, Aldri Luiz dos Santos, Lourenço Alves Pereira Junior | Published: 2025-03-18 Cyber ThreatData Generation MethodAttack Method 2025.03.18 2025.05.12 Literature Database
Zero-Knowledge Federated Learning: A New Trustworthy and Privacy-Preserving Distributed Learning Paradigm Authors: Yuxin Jin, Taotao Wang, Qing Yang, Long Shi, Shengli Zhang | Published: 2025-03-18 | Updated: 2025-03-24 Client Contribution AssessmentPrivacy-Preserving Machine LearningMalicious Client 2025.03.18 2025.05.12 Literature Database
Optimizing ML Training with Metagradient Descent Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17 PoisoningSelection and Evaluation of Optimization AlgorithmsDeep Learning 2025.03.17 2025.05.12 Literature Database
SOSecure: Safer Code Generation with RAG and StackOverflow Discussions Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17 RAGPoisoning attack on RAGVulnerability detection 2025.03.17 2025.05.12 Literature Database
Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17 Privacy Protection MethodEfficient Proof SystemDeep Learning 2025.03.17 2025.05.12 Literature Database