Literature Database

Tight and Practical Privacy Auditing for Differentially Private In-Context Learning

Authors: Yuyang Xia, Ruixuan Liu, Li Xiong | Published: 2025-11-17
Privacy Technique
Anonymization Technology
Differential Privacy

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
Trigger Detection
Backdoor Attack
Watermark Evaluation

Whistledown: Combining User-Level Privacy with Conversational Coherence in LLMs

Authors: Chelsea McMurray, Hayder Tirmazi | Published: 2025-11-17
Privacy Risk Management
Privacy Assurance
Privacy Technique

DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents

Authors: Fuyao Zhang, Jiaming Zhang, Che Wang, Xiongtao Sun, Yurong Hao, Guowei Guan, Wenjie Li, Longtao Huang, Wei Yang Bryan Lim | Published: 2025-11-17
Privacy Technique
Generative Model
Watermark Evaluation

SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports

Authors: Longfei Chen, Ruibin Yan, Taiyu Wong, Yiyang Chen, Chao Zhang | Published: 2025-11-17
Performance Evaluation Metrics
自動生成フレームワーク
Watermark Evaluation

SafeGRPO: Self-Rewarded Multimodal Safety Alignment via Rule-Governed Policy Optimization

Authors: Xuankun Rong, Wenke Huang, Tingfeng Wang, Daiguo Zhou, Bo Du, Mang Ye | Published: 2025-11-17
Privacy Technique
Inappropriate Content Generation
倫理的選択評価

SGuard-v1: Safety Guardrail for Large Language Models

Authors: JoonHo Lee, HyeonMin Cho, Jaewoong Yun, Hyunjae Lee, JunKyu Lee, Juree Seok | Published: 2025-11-16
Prompt Injection
Malicious Prompt
Adaptive Misuse Detection

SeedAIchemy: LLM-Driven Seed Corpus Generation for Fuzzing

Authors: Aidan Wen, Norah A. Alzahrani, Jingzhi Jiang, Andrew Joe, Karen Shieh, Andy Zhang, Basel Alomair, David Wagner | Published: 2025-11-16
バグ検出手法
Prompt Injection
Information Security

GRAPHTEXTACK: A Realistic Black-Box Node Injection Attack on LLM-Enhanced GNNs

Authors: Jiaji Ma, Puja Trivedi, Danai Koutra | Published: 2025-11-16
Poisoning attack on RAG
Classification of Malicious Actors
Information Security

The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models

Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16
Trigger Detection
Backdoor Detection
Backdoor Attack