ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 Backdoor DetectionBackdoor AttackModel Performance Evaluation 2025.03.07 2025.05.12 Literature Database
The Beginner’s Textbook for Fully Homomorphic Encryption Authors: Ronny Ko | Published: 2025-03-07 | Updated: 2025-03-14 Polynomial ApproximationMathematical AnalysisCryptography 2025.03.07 2025.05.12 Literature Database
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models via Watermarking Authors: Yijie Xu, Aiwei Liu, Xuming Hu, Lijie Wen, Hui Xiong | Published: 2025-03-06 | Updated: 2025-03-15 Digital Watermarking for Generative AIGenerative ModelWatermark Removal Technology 2025.03.06 2025.05.12 Literature Database
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 Indirect Prompt InjectionDeep LearningVulnerability detection 2025.03.05 2025.05.12 Literature Database
SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07 Privacy ProtectionModel Performance EvaluationDifferential Privacy 2025.03.05 2025.05.12 Literature Database
PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Hybrid Secret Sharing Authors: Zhichao You, Xuewen Dong, Ke Cheng, Xutong Mu, Jiaxuan Fu, Shiyang Ma, Qiang Qu, Yulong Shen | Published: 2025-03-05 | Updated: 2025-05-14 Bias Detection in AI OutputPrivacy Design PrinciplesCryptography 2025.03.05 2025.05.16 Literature Database
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 RAGCalculation of Output HarmfulnessAttack Detection 2025.03.05 2025.05.12 Literature Database
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 Attack MethodAdversarial Example DetectionDeep Learning 2025.03.04 2025.05.12 Literature Database
TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions Authors: Wang YuHang, Junkang Guo, Aolei Liu, Kaihao Wang, Zaitong Wu, Zhenyu Liu, Wenfei Yin, Jian Liu | Published: 2025-03-02 | Updated: 2025-03-21 RobustnessAdversarial LearningAdversarial Training 2025.03.02 2025.05.12 Literature Database
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 Privacy ProtectionCertified RobustnessModel Performance Evaluation 2025.03.01 2025.05.12 Literature Database