Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09 Privacy Protection MechanismEncryption TechnologyFederated Learning 2025.06.09 2025.06.11 Literature Database
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09 Model DoS再構成アルゴリズム評価メトリクス 2025.06.09 2025.06.11 Literature Database
Are Trees Really Green? A Detection Approach of IoT Malware Attacks Authors: Silvia Lucia Sanna, Diego Soi, Davide Maiorca, Giorgio Giacinto | Published: 2025-06-09 IoTネットワーク攻撃Advancements in Medical IoTOptimization Strategy 2025.06.09 2025.06.11 Literature Database
Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09 Certified RobustnessRobust OptimizationAdversarial Attack Methods 2025.06.09 2025.06.11 Literature Database
LLM Unlearning Should Be Form-Independent Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09 Training MethodCertified Robustness非意味的リダイレクション 2025.06.09 2025.06.11 Literature Database
“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09 API SecurityCyber ThreatInformation Leakage Analysis 2025.06.09 2025.06.11 Literature Database
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09 データ再構築攻撃Privacy Enhancing TechnologyMembership Inference 2025.06.09 2025.06.11 Literature Database
MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09 Cyber ThreatPrompt Injectionマルウェア生成 2025.06.09 2025.06.11 Literature Database
Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09 Cyber ThreatAnomaly Detection Algorithm説明可能な機械学習 2025.06.09 2025.06.11 Literature Database
Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09 Information-Theoretic ApproachDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2025.06.09 2025.06.11 Literature Database