Identifying Likely-Reputable Blockchain Projects on Ethereum Authors: Cyrus Malik, Josef Bajada, Joshua Ellul | Published: 2025-03-14 Data Extraction and AnalysisRisk Analysis MethodFeature Engineering 2025.03.14 2025.05.12 Literature Database
Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection Authors: Tianwei Lan, Luca Demetrio, Farid Nait-Abdesselam, Yufei Han, Simone Aonzo | Published: 2025-03-14 Backdoor AttackLabelAttack Method 2025.03.14 2025.05.12 Literature Database
Synthesizing Access Control Policies using Large Language Models Authors: Adarsh Vatsa, Pratyush Patel, William Eiers | Published: 2025-03-14 Bias Detection in AI OutputData Generation MethodPrivacy Design Principles 2025.03.14 2025.05.12 Literature Database
Align in Depth: Defending Jailbreak Attacks via Progressive Answer Detoxification Authors: Yingjie Zhang, Tong Liu, Zhe Zhao, Guozhu Meng, Kai Chen | Published: 2025-03-14 Disabling Safety Mechanisms of LLMPrompt InjectionMalicious Prompt 2025.03.14 2025.05.12 Literature Database
Siege: Autonomous Multi-Turn Jailbreaking of Large Language Models with Tree Search Authors: Andy Zhou | Published: 2025-03-13 | Updated: 2025-03-16 Disabling Safety Mechanisms of LLMAttack MethodGenerative Model 2025.03.13 2025.05.12 Literature Database
CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection Authors: Richard A. Dubniczky, Krisztofer Zoltán Horvát, Tamás Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro, Norbert Tihanyi | Published: 2025-03-12 | Updated: 2025-03-31 Security MetricPrompt leakingVulnerability Mitigation Technique 2025.03.12 2025.05.12 Literature Database
Adv-CPG: A Customized Portrait Generation Framework with Facial Adversarial Attacks Authors: Junying Wang, Hongyuan Zhang, Yuan Yuan | Published: 2025-03-11 Privacy ProtectionAdversarial ExampleFace Recognition System 2025.03.11 2025.05.12 Literature Database
Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 Performance EvaluationPrivacy Protection MethodDistributed Learning 2025.03.10 2025.05.12 Literature Database
Queueing, Predictions, and LLMs: Challenges and Open Problems Authors: Michael Mitzenmacher, Rana Shahout | Published: 2025-03-10 LLM Performance EvaluationScheduling MethodPrediction-Based Scheduling 2025.03.10 2025.05.12 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.12 Literature Database