Bayesian Robust Aggregation for Federated Learning Authors: Aleksandr Karakulev, Usama Zafar, Salman Toor, Prashant Singh | Published: 2025-05-05 グループベースの堅牢性トリガーの検知敵対的学習 2025.05.05 2025.05.12 Literature Database
Advancing Email Spam Detection: Leveraging Zero-Shot Learning and Large Language Models Authors: Ghazaleh SHirvani, Saeid Ghasemshirazi | Published: 2025-05-05 オンライン学習テキスト分類の応用機械学習技術 2025.05.05 2025.05.12 Literature Database
Analysis of the vulnerability of machine learning regression models to adversarial attacks using data from 5G wireless networks Authors: Leonid Legashev, Artur Zhigalov, Denis Parfenov | Published: 2025-05-01 バックドア攻撃ポイズニング攻撃タイプ 2025.05.01 2025.05.12 Literature Database
LLM-Based Threat Detection and Prevention Framework for IoT Ecosystems Authors: Yazan Otoum, Arghavan Asad, Amiya Nayak | Published: 2025-05-01 AIによる出力のバイアスの検出LLM性能評価プロンプトインジェクション 2025.05.01 2025.05.12 Literature Database
An Empirical Study on the Effectiveness of Large Language Models for Binary Code Understanding Authors: Xiuwei Shang, Zhenkan Fu, Shaoyin Cheng, Guoqiang Chen, Gangyang Li, Li Hu, Weiming Zhang, Nenghai Yu | Published: 2025-04-30 プログラム解析プロンプトインジェクションプロンプトリーキング 2025.04.30 2025.05.12 Literature Database
LASHED: LLMs And Static Hardware Analysis for Early Detection of RTL Bugs Authors: Baleegh Ahmad, Hammond Pearce, Ramesh Karri, Benjamin Tan | Published: 2025-04-30 プログラム解析プロンプトインジェクション脆弱性検出 2025.04.30 2025.05.12 Literature Database
Bilateral Differentially Private Vertical Federated Boosted Decision Trees Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30 プライバシーリスク管理差分プライバシー透かし設計 2025.04.30 2025.05.12 Literature Database
XBreaking: Explainable Artificial Intelligence for Jailbreaking LLMs Authors: Marco Arazzi, Vignesh Kumar Kembu, Antonino Nocera, Vinod P | Published: 2025-04-30 LLMの安全機構の解除プロンプトインジェクション説明手法 2025.04.30 2025.05.12 Literature Database
Hoist with His Own Petard: Inducing Guardrails to Facilitate Denial-of-Service Attacks on Retrieval-Augmented Generation of LLMs Authors: Pan Suo, Yu-Ming Shang, San-Chuan Guo, Xi Zhang | Published: 2025-04-30 LLM性能評価RAGへのポイズニング攻撃攻撃タイプ 2025.04.30 2025.05.12 Literature Database
Traceback of Poisoning Attacks to Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Minghong Fang, Zhuqing Liu, Biao Yi, Tong Li, Zheli Liu | Published: 2025-04-30 RAGへのポイズニング攻撃攻撃タイプ毒データの検知 2025.04.30 2025.05.12 Literature Database