Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09 Certified RobustnessRobust OptimizationAdversarial Attack Methods 2025.06.09 2025.06.11 Literature Database
LLM Unlearning Should Be Form-Independent Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09 Training MethodCertified Robustness非意味的リダイレクション 2025.06.09 2025.06.11 Literature Database
“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09 API SecurityCyber ThreatInformation Leakage Analysis 2025.06.09 2025.06.11 Literature Database
TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09 データ再構築攻撃Privacy Enhancing TechnologyMembership Inference 2025.06.09 2025.06.11 Literature Database
MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09 Cyber ThreatPrompt Injectionマルウェア生成 2025.06.09 2025.06.11 Literature Database
Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09 Cyber ThreatAnomaly Detection Algorithm説明可能な機械学習 2025.06.09 2025.06.11 Literature Database
Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09 Information-Theoretic ApproachDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2025.06.09 2025.06.11 Literature Database
Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures Authors: Yukai Zhou, Sibei Yang, Wenjie Wang | Published: 2025-06-09 Cooperative Effects with LLMCyber ThreatLarge Language Model 2025.06.09 2025.06.11 Literature Database
JavelinGuard: Low-Cost Transformer Architectures for LLM Security Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09 Privacy Enhancing TechnologyPrompt InjectionModel Architecture 2025.06.09 2025.06.11 Literature Database
Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11 API SecurityEvaluation MethodSelection Method 2025.06.08 2025.06.13 Literature Database