Defending Diffusion Models Against Membership Inference Attacks via Higher-Order Langevin Dynamics Authors: Benjamin Sterling, Yousef El-Laham, Mónica F. Bugallo | Published: 2025-09-17 2025.09.17 2025.09.19 Literature Database
Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17 2025.09.17 2025.09.19 Literature Database
Who Taught the Lie? Responsibility Attribution for Poisoned Knowledge in Retrieval-Augmented Generation Authors: Baolei Zhang, Haoran Xin, Yuxi Chen, Zhuqing Liu, Biao Yi, Tong Li, Lihai Nie, Zheli Liu, Minghong Fang | Published: 2025-09-17 2025.09.17 2025.09.19 Literature Database
Secure UAV-assisted Federated Learning: A Digital Twin-Driven Approach with Zero-Knowledge Proofs Authors: Md Bokhtiar Al Zami, Md Raihan Uddin, Dinh C. Nguyen | Published: 2025-09-17 2025.09.17 2025.09.19 Literature Database
Privacy-Aware In-Context Learning for Large Language Models Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17 2025.09.17 2025.09.19 Literature Database
Sy-FAR: Symmetry-based Fair Adversarial Robustness Authors: Haneen Najjar, Eyal Ronen, Mahmood Sharif | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
Jailbreaking Large Language Models Through Content Concretization Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
A Graph-Based Approach to Alert Contextualisation in Security Operations Centres Authors: Magnus Wiik Eckhoff, Peter Marius Flydal, Siem Peters, Martin Eian, Jonas Halvorsen, Vasileios Mavroeidis, Gudmund Grov | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
EByFTVeS: Efficient Byzantine Fault Tolerant-based Verifiable Secret-sharing in Distributed Privacy-preserving Machine Learning Authors: Zhen Li, Zijian Zhang, Wenjin Yang, Pengbo Wang, Zhaoqi Wang, Meng Li, Yan Wu, Xuyang Liu, Jing Sun, Liehuang Zhu | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database
A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16 2025.09.16 2025.09.18 Literature Database