Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation Authors: Yuxuan Qiao, Dongqin Liu, Hongchang Yang, Wei Zhou, Songlin Hu | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
In-Context Probing for Membership Inference in Fine-Tuned Language Models Authors: Zhexi Lu, Hongliang Chi, Nathalie Baracaldo, Swanand Ravindra Kadhe, Yuseok Jeon, Lei Yu | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams Authors: Gilad Gressel, Rahul Pankajakshan, Shir Rozenfeld, Ling Li, Ivan Franceschini, Krishnahsree Achuthan, Yisroel Mirsky | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
DualGuard: Dual-stream Large Language Model Watermarking Defense against Paraphrase and Spoofing Attack Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Shi Wang, Li Guo | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
ContextLeak: Auditing Leakage in Private In-Context Learning Methods Authors: Jacob Choi, Shuying Cao, Xingjian Dong, Wang Bill Zhu, Robin Jia, Sai Praneeth Karimireddy | Published: 2025-12-18 2025.12.18 2025.12.20 Literature Database
FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption Authors: Zhihan Xu, Rajgopal Kannan, Viktor K. Prasanna | Published: 2025-12-17 2025.12.17 2025.12.19 Literature Database
How Do Semantically Equivalent Code Transformations Impact Membership Inference on LLMs for Code? Authors: Hua Yang, Alejandro Velasco, Thanh Le-Cong, Md Nazmul Haque, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-17 2025.12.17 2025.12.19 Literature Database
Remotely Detectable Robot Policy Watermarking Authors: Michael Amir, Manon Flageat, Amanda Prorok | Published: 2025-12-17 2025.12.17 2025.12.19 Literature Database
Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions Authors: Siva Sai, Ishika Goyal, Shubham Sharma, Sri Harshita Manuri, Vinay Chamola, Rajkumar Buyya | Published: 2025-12-17 2025.12.17 2025.12.19 Literature Database
Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries Authors: Louis Hackländer-Jansen, Rafael Uetz, Martin Henze | Published: 2025-12-17 2025.12.17 2025.12.19 Literature Database