I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05 Application Classification MethodChanges in User BehaviorMachine Learning Technology 2025.01.25 2025.05.12 Literature Database
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27 Privacy IssuesWatermarking TechnologyFederated Learning 2025.01.22 2025.05.12 Literature Database
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks Authors: Akshayaa Magesh, Venugopal V. Veeravalli | Published: 2025-01-21 Convergence GuaranteeConvergence AnalysisCommunication Efficiency 2025.01.21 2025.05.12 Literature Database
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 Backdoor AttackPoisoningExperimental Validation 2025.01.21 2025.05.12 Literature Database
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 Poisoning attack on RAGTag Selection StrategyPoisoning Attack 2025.01.20 2025.05.12 Literature Database
Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu | Published: 2025-01-20 Privacy TechniqueAttack that Analyzes Images with AI to Infer Personal InformationFacial Recognition Technology 2025.01.20 2025.05.12 Literature Database
LegalGuardian: A Privacy-Preserving Framework for Secure Integration of Large Language Models in Legal Practice Authors: M. Mikail Demir, Hakan T. Otal, M. Abdullah Canbaz | Published: 2025-01-19 Privacy ProtectionImprovement of LearningSafety Alignment 2025.01.19 2025.05.12 Literature Database
Latent-space adversarial training with post-aware calibration for defending large language models against jailbreak attacks Authors: Xin Yi, Yue Li, Linlin Wang, Xiaoling Wang, Liang He | Published: 2025-01-18 Prompt InjectionAdversarial TrainingExcessive Denial Mitigation 2025.01.18 2025.05.12 Literature Database
AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18 IPv6 SecurityNetwork Threat DetectionCommunication Analysis 2025.01.18 2025.05.12 Literature Database
Differentiable Adversarial Attacks for Marked Temporal Point Processes Authors: Pritish Chakraborty, Vinayak Gupta, Rahul R, Srikanta J. Bedathur, Abir De | Published: 2025-01-17 Adversarial ExampleOptimization Problem 2025.01.17 2025.05.12 Literature Database