One Trigger Token Is Enough: A Defense Strategy for Balancing Safety and Usability in Large Language Models Authors: Haoran Gu, Handing Wang, Yi Mei, Mengjie Zhang, Yaochu Jin | Published: 2025-05-12 LLM SecurityDisabling Safety Mechanisms of LLMPrompt Injection 2025.05.12 2025.05.28 Literature Database
I Know What You Said: Unveiling Hardware Cache Side-Channels in Local Large Language Model Inference Authors: Zibo Gao, Junjie Hu, Feng Guo, Yixin Zhang, Yinglong Han, Siyuan Liu, Haiyang Li, Zhiqiang Lv | Published: 2025-05-10 | Updated: 2025-05-14 Disabling Safety Mechanisms of LLMPrompt leakingAttack Detection Method 2025.05.10 2025.05.28 Literature Database
Cape: Context-Aware Prompt Perturbation Mechanism with Differential Privacy Authors: Haoqi Wu, Wei Dai, Li Wang, Qiang Yan | Published: 2025-05-09 | Updated: 2025-05-15 Token Identification MethodPrivacy Design PrinciplesEvaluation Method 2025.05.09 2025.05.28 Literature Database
AGENTFUZZER: Generic Black-Box Fuzzing for Indirect Prompt Injection against LLM Agents Authors: Zhun Wang, Vincent Siu, Zhe Ye, Tianneng Shi, Yuzhou Nie, Xuandong Zhao, Chenguang Wang, Wenbo Guo, Dawn Song | Published: 2025-05-09 | Updated: 2025-05-21 Indirect Prompt InjectionFuzzingAttack Type 2025.05.09 2025.05.28 Literature Database
LLM-Text Watermarking based on Lagrange Interpolation Authors: Jarosław Janas, Paweł Morawiecki, Josef Pieprzyk | Published: 2025-05-09 | Updated: 2025-05-13 LLM SecurityPrompt leakingDigital Watermarking for Generative AI 2025.05.09 2025.05.28 Literature Database
Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 Prompt leakingAttack MethodWatermarking Technology 2025.05.08 2025.05.12 Literature Database
FedTDP: A Privacy-Preserving and Unified Framework for Trajectory Data Preparation via Federated Learning Authors: Zhihao Zeng, Ziquan Fang, Wei Shao, Lu Chen, Yunjun Gao | Published: 2025-05-08 Privacy Design PrinciplesModel DesignMachine Learning Technology 2025.05.08 2025.05.27 Literature Database
A Weighted Byzantine Fault Tolerance Consensus Driven Trusted Multiple Large Language Models Network Authors: Haoxiang Luo, Gang Sun, Yinqiu Liu, Dongcheng Zhao, Dusit Niyato, Hongfang Yu, Schahram Dustdar | Published: 2025-05-08 Byzantine Consensus MechanismModel DoSReliability Assessment 2025.05.08 2025.05.27 Literature Database
An Agent-Based Modeling Approach to Free-Text Keyboard Dynamics for Continuous Authentication Authors: Roberto Dillon, Arushi | Published: 2025-05-08 Typing Behavior ModelUser CharacteristicsMachine Learning Application 2025.05.08 2025.05.27 Literature Database
Federated Learning for Cyber Physical Systems: A Comprehensive Survey Authors: Minh K. Quan, Pubudu N. Pathirana, Mayuri Wijayasundara, Sujeeva Setunge, Dinh C. Nguyen, Christopher G. Brinton, David J. Love, H. Vincent Poor | Published: 2025-05-08 Decentralized FL-CPSMachine Learning ApplicationFederated Learning 2025.05.08 2025.05.27 Literature Database