Secret-Protected Evolution for Differentially Private Synthetic Text Generation Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13 Data Protection MethodPrivacy Enhancing TechnologyDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Adversarial Robustness in One-Stage Learning-to-Defer Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13 RobustnessAdversarial LearningDefense Mechanism 2025.10.13 2025.10.15 Literature Database
Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13 Adversarial LearningDeep Reinforcement LearningDefense Effectiveness Analysis 2025.10.13 2025.10.15 Literature Database
Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13 Privacy Enhancing TechnologyModel Protection Methods情報理論的関係 2025.10.13 2025.10.15 Literature Database
SimKey: A Semantically Aware Key Module for Watermarking Language Models Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03 Privacy ProtectionInformation SecurityGenerative Adversarial Network 2025.10.11 2025.11.05 Literature Database
Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization Authors: Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu | Published: 2025-10-11 | Updated: 2025-10-27 トリガーベースの透かし画像処理手法Watermarking Technology 2025.10.11 2025.10.29 Literature Database
New Machine Learning Approaches for Intrusion Detection in ADS-B Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09 Backdoor DetectionPerformance Evaluation Metrics通信セキュリティ 2025.10.09 2025.10.11 Literature Database
LLM-Assisted Web Measurements Authors: Simone Bozzolan, Stefano Calzavara, Lorenzo Cazzaro | Published: 2025-10-09 Bias Detection in AI OutputApplication Classification MethodPrompt Injection 2025.10.09 2025.10.11 Literature Database
A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09 IoT Security ChallengesDefense MechanismDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database
Fewer Weights, More Problems: A Practical Attack on LLM Pruning Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09 Security Analysis MethodPrompt InjectionDefense Effectiveness Analysis 2025.10.09 2025.10.11 Literature Database