Literature Database

Critical Evaluation of Quantum Machine Learning for Adversarial Robustness

Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19
Backdoor Attack
Adversarial Learning
Quantum Machine Learning

Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection

Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18
Robustness Verification Method
Watermark Evaluation
Adaptive Misuse Detection

Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security

Authors: Hajun Kim, Hyunsik Na, Daeseon Choi | Published: 2025-11-18
Prompt Engineering
Large Language Model
Malicious Prompt

Observational Auditing of Label Privacy

Authors: Iden Kalemaj, Luca Melis, Maxime Boucher, Ilya Mironov, Saeed Mahloujifar | Published: 2025-11-18
Detection of Poison Data for Backdoor Attacks
Privacy Technique
Differential Privacy

Dynamic Black-box Backdoor Attacks on IoT Sensory Data

Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18
Trigger Detection
Backdoor Attack
Generative Model

GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards

Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18
Privacy Technique
Membership Inference
Differential Privacy

TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone

Authors: Xunjie Wang, Jiacheng Shi, Zihan Zhao, Yang Yu, Zhichao Hua, Jinyu Gu | Published: 2025-11-17
Prompt leaking
Model DoS
Performance Evaluation Metrics

Robust Client-Server Watermarking for Split Federated Learning

Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17
Trigger Detection
Privacy Technique
Watermark Evaluation

ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models

Authors: Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu | Published: 2025-11-17
Prompt Injection
Large Language Model
Evolutionary Algorithm

Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP

Authors: Elodie Mutombo Ngoie, Mike Nkongolo Wa Nkongolo, Peace Azugo, Mahmut Tokmak | Published: 2025-11-17
Membership Inference
Deep Learning-Based IDS
Feature Selection Method