Character-Level Perturbations Disrupt LLM Watermarks Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11 Attack MethodDigital Watermarking for Generative AIWatermark Design 2025.09.11 2025.09.13 Literature Database
AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11 Prompt Injection作物病害管理農薬使用法 2025.09.11 2025.09.13 Literature Database
DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large Language Models Authors: Honghui Xu, Shiva Shrestha, Wei Chen, Zhiyuan Li, Zhipeng Cai | Published: 2025-09-11 Privacy TechniqueConvergence AnalysisDifferential Privacy 2025.09.11 2025.09.13 Literature Database
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11 AlgorithmPrivacy TechniqueDifferential Privacy 2025.09.11 2025.09.13 Literature Database
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10 Indirect Prompt InjectionSecurity Information Management計画と実行のパターン 2025.09.10 2025.09.12 Literature Database
Send to which account? Evaluation of an LLM-based Scambaiting System Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10 Disabling Safety Mechanisms of LLMResearch Methodology詐欺対策 2025.09.10 2025.09.12 Literature Database
Efficient Decoding Methods for Language Models on Encrypted Data Authors: Matan Avitan, Moran Baruch, Nir Drucker, Itamar Zimerman, Yoav Goldberg | Published: 2025-09-10 HEサンプリング手法Efficiency EvaluationProbability distribution 2025.09.10 2025.09.12 Literature Database
Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity Preservation Authors: Duddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das | Published: 2025-09-10 Website Vulnerabilityフィッシング攻撃の傾向Visual Similarity Detection 2025.09.10 2025.09.12 Literature Database
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08 Prompt InjectionImbalanced DatasetSynthetic Data Generation 2025.09.08 2025.09.10 Literature Database
Proof-Carrying Numbers (PCN): A Protocol for Trustworthy Numeric Answers from LLMs via Claim Verification Authors: Aivin V. Solatorio | Published: 2025-09-08 HallucinationEfficient Proof System監査手法 2025.09.08 2025.09.10 Literature Database