Literature Database

文献データベースでは、AIセキュリティに関する文献情報を分類・集約しています。詳しくは文献データベースについてをご覧ください。統計情報のページでは、収集された文献に関する統計情報を公開しています。
The Literature Database categorizes and aggregates literature related to AI security. For more details, please see About Literature Database. We provide statistical information regarding the Literature Database on the Statistics page.

PVMark: Enabling Public Verifiability for LLM Watermarking Schemes

Authors: Haohua Duan, Liyao Xiang, Xin Zhang | Published: 2025-10-30
Model Extraction Attack
公的検証可能性
Watermarking Technology

ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio-Language Models

Authors: Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao, Ke Xu, Jin Song Dong, Derui Wang | Published: 2025-10-30
Prompt Injection
Impact of Generalization
倫理基準遵守

Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29
Membership Inference
Model Inversion
Defense Method

Spectral Perturbation Bounds for Low-Rank Approximation with Applications to Privacy

Authors: Phuc Tran, Nisheeth K. Vishnoi, Van H. Vu | Published: 2025-10-29
Privacy-Preserving Algorithm
Computational Efficiency
Function Boundary Pair Formation

Monitoring the calibration of probability forecasts with an application to concept drift detection involving image classification

Authors: Christopher T. Franck, Anne R. Driscoll, Zoe Szajnfarber, William H. Woodall | Published: 2025-10-29
キャリブレーション
制御限界
画像分類

NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery

Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29
Network Traffic Analysis
Model Extraction Attack
Defense Method

An In-Depth Analysis of Cyber Attacks in Secured Platforms

Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29
Cyber Threat
Privacy Leakage
Defense Method

AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios

Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29
サービスの構成
Network Node Configuration
Performance Evaluation

A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies

Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28
Performance Evaluation
Model evaluation methods
Quantum Information and Quantum Computing

Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference

Authors: Tejaswini Bollikonda | Published: 2025-10-28
Privacy Protection
Encryption Technology
暗号化環境でのデータ処理