Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15 2025.03.10 2025.05.27 Literature Database
Queueing, Predictions, and LLMs: Challenges and Open Problems Authors: Michael Mitzenmacher, Rana Shahout | Published: 2025-03-10 2025.03.10 2025.05.27 Literature Database
How Well Can Differential Privacy Be Audited in One Run? Authors: Amit Keinan, Moshe Shenfeld, Katrina Ligett | Published: 2025-03-10 | Updated: 2025-05-26 2025.03.10 2025.05.28 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 2025.03.08 2025.05.27 Literature Database
Nearly Optimal Differentially Private ReLU Regression Authors: Meng Ding, Mingxi Lei, Shaowei Wang, Tianhang Zheng, Di Wang, Jinhui Xu | Published: 2025-03-08 | Updated: 2025-06-10 2025.03.08 2025.06.12 Literature Database
ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 2025.03.07 2025.05.27 Literature Database
The Beginner’s Textbook for Fully Homomorphic Encryption Authors: Ronny Ko | Published: 2025-03-07 | Updated: 2025-05-20 2025.03.07 2025.05.27 Literature Database
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models via Watermarking Authors: Yijie Xu, Aiwei Liu, Xuming Hu, Lijie Wen, Hui Xiong | Published: 2025-03-06 | Updated: 2025-03-15 2025.03.06 2025.05.27 Literature Database
Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16 2025.03.06 2025.06.18 Literature Database
UniNet: A Unified Multi-granular Traffic Modeling Framework for Network Security Authors: Binghui Wu, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2025-03-06 | Updated: 2025-07-03 2025.03.06 2025.07.05 Literature Database