ZKTorch: Compiling ML Inference to Zero-Knowledge Proofs via Parallel Proof Accumulation Authors: Bing-Jyue Chen, Lilia Tang, Daniel Kang | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
BarkBeetle: Stealing Decision Tree Models with Fault Injection Authors: Qifan Wang, Jonas Sander, Minmin Jiang, Thomas Eisenbarth, David Oswald | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Unifying Re-Identification, Attribute Inference, and Data Reconstruction Risks in Differential Privacy Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Jamie Hayes, Borja Balle, Flavio du Pin Calmon, Jean Louis Raisaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
The Dark Side of LLMs Agent-based Attacks for Complete Computer Takeover Authors: Matteo Lupinacci, Francesco Aurelio Pironti, Francesco Blefari, Francesco Romeo, Luigi Arena, Angelo Furfaro | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
PenTest2.0: Towards Autonomous Privilege Escalation Using GenAI Authors: Haitham S. Al-Sinani, Chris J. Mitchell | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Approximating Euler Totient Function using Linear Regression on RSA moduli Authors: Gilda Rech Bansimba, Regis F. Babindamana, Beni Blaug N. Ibara | Published: 2025-07-09 2025.07.09 2025.07.11 Literature Database
Taming Data Challenges in ML-based Security Tasks: Lessons from Integrating Generative AI Authors: Shravya Kanchi, Neal Mangaokar, Aravind Cheruvu, Sifat Muhammad Abdullah, Shirin Nilizadeh, Atul Prakash, Bimal Viswanath | Published: 2025-07-08 2025.07.08 2025.07.10 Literature Database
CAVGAN: Unifying Jailbreak and Defense of LLMs via Generative Adversarial Attacks on their Internal Representations Authors: Xiaohu Li, Yunfeng Ning, Zepeng Bao, Mayi Xu, Jianhao Chen, Tieyun Qian | Published: 2025-07-08 2025.07.08 2025.07.10 Literature Database
The Landscape of Memorization in LLMs: Mechanisms, Measurement, and Mitigation Authors: Alexander Xiong, Xuandong Zhao, Aneesh Pappu, Dawn Song | Published: 2025-07-08 2025.07.08 2025.07.10 Literature Database
iThermTroj: Exploiting Intermittent Thermal Trojans in Multi-Processor System-on-Chips Authors: Mehdi Elahi, Mohamed R. Elshamy, Abdel-Hameed Badawy, Ahmad Patooghy | Published: 2025-07-08 2025.07.08 2025.07.10 Literature Database