Critical Evaluation of Quantum Machine Learning for Adversarial Robustness Authors: Saeefa Rubaiyet Nowmi, Jesus Lopez, Md Mahmudul Alam Imon, Shahrooz Pouryouse, Mohammad Saidur Rahman | Published: 2025-11-19 Backdoor AttackAdversarial LearningQuantum Machine Learning 2025.11.19 2025.11.21 Literature Database
Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18 Robustness Verification MethodWatermark EvaluationAdaptive Misuse Detection 2025.11.18 2025.11.20 Literature Database
Beyond Fixed and Dynamic Prompts: Embedded Jailbreak Templates for Advancing LLM Security Authors: Hajun Kim, Hyunsik Na, Daeseon Choi | Published: 2025-11-18 Prompt EngineeringLarge Language ModelMalicious Prompt 2025.11.18 2025.11.20 Literature Database
Observational Auditing of Label Privacy Authors: Iden Kalemaj, Luca Melis, Maxime Boucher, Ilya Mironov, Saeed Mahloujifar | Published: 2025-11-18 Detection of Poison Data for Backdoor AttacksPrivacy TechniqueDifferential Privacy 2025.11.18 2025.11.20 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 Trigger DetectionBackdoor AttackGenerative Model 2025.11.18 2025.11.20 Literature Database
GRPO Privacy Is at Risk: A Membership Inference Attack Against Reinforcement Learning With Verifiable Rewards Authors: Yule Liu, Heyi Zhang, Jinyi Zheng, Zhen Sun, Zifan Peng, Tianshuo Cong, Yilong Yang, Xinlei He, Zhuo Ma | Published: 2025-11-18 Privacy TechniqueMembership InferenceDifferential Privacy 2025.11.18 2025.11.20 Literature Database
TZ-LLM: Protecting On-Device Large Language Models with Arm TrustZone Authors: Xunjie Wang, Jiacheng Shi, Zihan Zhao, Yang Yu, Zhichao Hua, Jinyu Gu | Published: 2025-11-17 Prompt leakingModel DoSPerformance Evaluation Metrics 2025.11.17 2025.11.19 Literature Database
Robust Client-Server Watermarking for Split Federated Learning Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17 Trigger DetectionPrivacy TechniqueWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
ForgeDAN: An Evolutionary Framework for Jailbreaking Aligned Large Language Models Authors: Siyang Cheng, Gaotian Liu, Rui Mei, Yilin Wang, Kejia Zhang, Kaishuo Wei, Yuqi Yu, Weiping Wen, Xiaojie Wu, Junhua Liu | Published: 2025-11-17 Prompt InjectionLarge Language ModelEvolutionary Algorithm 2025.11.17 2025.11.19 Literature Database
Interpretable Ransomware Detection Using Hybrid Large Language Models: A Comparative Analysis of BERT, RoBERTa, and DeBERTa Through LIME and SHAP Authors: Elodie Mutombo Ngoie, Mike Nkongolo Wa Nkongolo, Peace Azugo, Mahmut Tokmak | Published: 2025-11-17 Membership InferenceDeep Learning-Based IDSFeature Selection Method 2025.11.17 2025.11.19 Literature Database