D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning Authors: Yash Srivastava, Shalin Jain, Sneha Awathare, Nitin Awathare | Published: 2025-12-11 Blockchain Technology経済的実現可能性Federated Learning System 2025.12.11 2025.12.13 Literature Database
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs Authors: Venkata Tanuja Madireddy | Published: 2025-12-11 グラフ分析Trigger Detection行動分析手法 2025.12.11 2025.12.13 Literature Database
FlipLLM: Efficient Bit-Flip Attacks on Multimodal LLMs using Reinforcement Learning Authors: Khurram Khalil, Khaza Anuarul Hoque | Published: 2025-12-10 Prompt InjectionLarge Language ModelVulnerability Assessment Method 2025.12.10 2025.12.12 Literature Database
True Random Number Generators on IQM Spark Authors: Andrzej Gnatowski, Jarosław Rudy, Teodor Niżyński, Krzysztof Święcicki | Published: 2025-12-10 エラー解析Statistical Hypothesis TestingQuantum Framework 2025.12.10 2025.12.12 Literature Database
Defining Cost Function of Steganography with Large Language Models Authors: Hanzhou Wu, Yige Wang | Published: 2025-12-10 画像処理手法evaluation metricsEvolutionary Score Calculation 2025.12.10 2025.12.12 Literature Database
Chasing Shadows: Pitfalls in LLM Security Research Authors: Jonathan Evertz, Niklas Risse, Nicolai Neuer, Andreas Müller, Philipp Normann, Gaetano Sapia, Srishti Gupta, David Pape, Soumya Shaw, Devansh Srivastav, Christian Wressnegger, Erwin Quiring, Thorsten Eisenhofer, Daniel Arp, Lea Schönherr | Published: 2025-12-10 Prompt InjectionPrompt leaking 2025.12.10 2025.12.12 Literature Database
Advancing LLM-Based Security Automation with Customized Group Relative Policy Optimization for Zero-Touch Networks Authors: Xinye Cao, Yihan Lin, Guoshun Nan, Qinchuan Zhou, Yuhang Luo, Yurui Gao, Zeliang Zhang, Haolang Lu, Qimei Cui, Yanzhao Hou, Xiaofeng Tao, Tony Q. S. Quek | Published: 2025-12-10 SecLoopの自動化された応答機能CybersecurityReinforcement Learning 2025.12.10 2025.12.12 Literature Database
BugSweeper: Function-Level Detection of Smart Contract Vulnerabilities Using Graph Neural Networks Authors: Uisang Lee, Changhoon Chung, Junmo Lee, Soo-Mook Moon | Published: 2025-12-10 CybersecurityBlockchain 2025.12.10 2025.12.12 Literature Database
Impact of Positional Encoding: Clean and Adversarial Rademacher Complexity for Transformers under In-Context Regression Authors: Weiyi He, Yue Xing | Published: 2025-12-10 エラー解析Robustness Analysis一般化境界 2025.12.10 2025.12.12 Literature Database
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety Authors: Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong | Published: 2025-12-09 Privacy AssurancePrivacy AnalysisFederated Learning 2025.12.09 2025.12.11 Literature Database