Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07 LLM ApplicationRisk Analysis MethodInformation Security 2025.02.10 2025.05.27 Literature Database
Membership Inference Risks in Quantized Models: A Theoretical and Empirical Study Authors: Eric Aubinais, Philippe Formont, Pablo Piantanida, Elisabeth Gassiat | Published: 2025-02-10 Membership InferenceQuantization and Privacy 2025.02.10 2025.05.27 Literature Database
Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24 AlignmentPrivacy-Preserving Data MiningWatermark 2025.02.10 2025.05.27 Literature Database
From Counterfactuals to Trees: Competitive Analysis of Model Extraction Attacks Authors: Awa Khouna, Julien Ferry, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08 Model Extraction AttackDetection of Model Extraction Attacks再構成アルゴリズム 2025.02.07 2025.07.10 Literature Database
Training Set Reconstruction from Differentially Private Forests: How Effective is DP? Authors: Alice Gorgé, Julien Ferry, Sébastien Gambs, Thibaut Vidal | Published: 2025-02-07 | Updated: 2025-07-08 Privacy Risk Management再構成アルゴリズムDifferential Privacy 2025.02.07 2025.07.10 Literature Database
Can LLMs Hack Enterprise Networks? Autonomous Assumed Breach Penetration-Testing Active Directory Networks Authors: Andreas Happe, Jürgen Cito | Published: 2025-02-06 | Updated: 2025-09-11 Indirect Prompt InjectionPrompt Injection攻撃戦略分析 2025.02.06 2025.09.13 Literature Database
“Short-length” Adversarial Training Helps LLMs Defend “Long-length” Jailbreak Attacks: Theoretical and Empirical Evidence Authors: Shaopeng Fu, Liang Ding, Di Wang | Published: 2025-02-06 Prompt InjectionLarge Language ModelAdversarial Training 2025.02.06 2025.05.27 Literature Database
ExpProof : Operationalizing Explanations for Confidential Models with ZKPs Authors: Chhavi Yadav, Evan Monroe Laufer, Dan Boneh, Kamalika Chaudhuri | Published: 2025-02-06 | Updated: 2025-05-27 XAI (Explainable AI)Model evaluation methodsInterpretability 2025.02.06 2025.05.29 Literature Database
SimMark: A Robust Sentence-Level Similarity-Based Watermarking Algorithm for Large Language Models Authors: Amirhossein Dabiriaghdam, Lele Wang | Published: 2025-02-05 | Updated: 2025-09-11 Robustness AnalysisDigital Watermarking for Generative AIWatermark Design 2025.02.05 2025.09.13 Literature Database
Privacy Amplification by Structured Subsampling for Deep Differentially Private Time Series Forecasting Authors: Jan Schuchardt, Mina Dalirrooyfard, Jed Guzelkabaagac, Anderson Schneider, Yuriy Nevmyvaka, Stephan Günnemann | Published: 2025-02-04 | Updated: 2025-05-29 Privacy AnalysisDifferential PrivacyInformation-Theoretic Evaluation 2025.02.04 2025.05.31 Literature Database