Literature Database

Secret-Protected Evolution for Differentially Private Synthetic Text Generation

Authors: Tianze Wang, Zhaoyu Chen, Jian Du, Yingtai Xiao, Linjun Zhang, Qiang Yan | Published: 2025-10-13
Data Protection Method
Privacy Enhancing Technology
Defense Mechanism

Adversarial Robustness in One-Stage Learning-to-Defer

Authors: Yannis Montreuil, Letian Yu, Axel Carlier, Lai Xing Ng, Wei Tsang Ooi | Published: 2025-10-13
Robustness
Adversarial Learning
Defense Mechanism

Neutral Agent-based Adversarial Policy Learning against Deep Reinforcement Learning in Multi-party Open Systems

Authors: Qizhou Peng, Yang Zheng, Yu Wen, Yanna Wu, Yingying Du | Published: 2025-10-13
Adversarial Learning
Deep Reinforcement Learning
Defense Effectiveness Analysis

Quantifying Information Disclosure During Gradient Descent Using Gradient Uniqueness

Authors: Mahmoud Abdelghafar, Maryam Aliakbarpour, Chris Jermaine | Published: 2025-10-13
Privacy Enhancing Technology
Model Protection Methods
情報理論的関係

SimKey: A Semantically Aware Key Module for Watermarking Language Models

Authors: Shingo Kodama, Haya Diwan, Lucas Rosenblatt, R. Teal Witter, Niv Cohen | Published: 2025-10-11 | Updated: 2025-11-03
Privacy Protection
Information Security
Generative Adversarial Network

Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization

Authors: Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu | Published: 2025-10-11 | Updated: 2025-10-27
トリガーベースの透かし
画像処理手法
Watermarking Technology

New Machine Learning Approaches for Intrusion Detection in ADS-B

Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09
Backdoor Detection
Performance Evaluation Metrics
通信セキュリティ

LLM-Assisted Web Measurements

Authors: Simone Bozzolan, Stefano Calzavara, Lorenzo Cazzaro | Published: 2025-10-09
Bias Detection in AI Output
Application Classification Method
Prompt Injection

A Novel Ensemble Learning Approach for Enhanced IoT Attack Detection: Redefining Security Paradigms in Connected Systems

Authors: Hikmat A. M. Abdeljaber, Md. Alamgir Hossain, Sultan Ahmad, Ahmed Alsanad, Md Alimul Haque, Sudan Jha, Jabeen Nazeer | Published: 2025-10-09
IoT Security Challenges
Defense Mechanism
Defense Effectiveness Analysis

Fewer Weights, More Problems: A Practical Attack on LLM Pruning

Authors: Kazuki Egashira, Robin Staab, Thibaud Gloaguen, Mark Vero, Martin Vechev | Published: 2025-10-09
Security Analysis Method
Prompt Injection
Defense Effectiveness Analysis