Literature Database

In-Context Probing for Membership Inference in Fine-Tuned Language Models

Authors: Zhexi Lu, Hongliang Chi, Nathalie Baracaldo, Swanand Ravindra Kadhe, Yuseok Jeon, Lei Yu | Published: 2025-12-18
Bias Detection in AI Output
Privacy-Preserving Machine Learning
Prompt leaking

Love, Lies, and Language Models: Investigating AI’s Role in Romance-Baiting Scams

Authors: Gilad Gressel, Rahul Pankajakshan, Shir Rozenfeld, Ling Li, Ivan Franceschini, Krishnahsree Achuthan, Yisroel Mirsky | Published: 2025-12-18
LLM活用
Indirect Prompt Injection
Social Impact

DualGuard: Dual-stream Large Language Model Watermarking Defense against Paraphrase and Spoofing Attack

Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Shi Wang, Li Guo | Published: 2025-12-18
Spoofing Attack Analysis
Digital Watermarking for Generative AI
Watermark Robustness

ContextLeak: Auditing Leakage in Private In-Context Learning Methods

Authors: Jacob Choi, Shuying Cao, Xingjian Dong, Wang Bill Zhu, Robin Jia, Sai Praneeth Karimireddy | Published: 2025-12-18
Data Leakage
Privacy-Preserving Machine Learning
Prompt leaking

FAME: FPGA Acceleration of Secure Matrix Multiplication with Homomorphic Encryption

Authors: Zhihan Xu, Rajgopal Kannan, Viktor K. Prasanna | Published: 2025-12-17
FPGA Security
Privacy-Preserving Machine Learning
Matrix Multiplication Methods

How Do Semantically Equivalent Code Transformations Impact Membership Inference on LLMs for Code?

Authors: Hua Yang, Alejandro Velasco, Thanh Le-Cong, Md Nazmul Haque, Bowen Xu, Denys Poshyvanyk | Published: 2025-12-17
コード変換の因果分析
Code Obfuscation
Privacy Analysis

Remotely Detectable Robot Policy Watermarking

Authors: Michael Amir, Manon Flageat, Amanda Prorok | Published: 2025-12-17
信号処理技術
Reinforcement Learning Algorithm
Watermarking Technology

Quantum Machine Learning for Cybersecurity: A Taxonomy and Future Directions

Authors: Siva Sai, Ishika Goyal, Shubham Sharma, Sri Harshita Manuri, Vinay Chamola, Rajkumar Buyya | Published: 2025-12-17
Privacy protection framework
通信セキュリティ
Quantum Information and Quantum Computing

Bounty Hunter: Autonomous, Comprehensive Emulation of Multi-Faceted Adversaries

Authors: Louis Hackländer-Jansen, Rafael Uetz, Martin Henze | Published: 2025-12-17
攻撃計画手法
Literature List
自動化された脅威エミュレーション

An Efficient Gradient-Based Inference Attack for Federated Learning

Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17
Privacy Analysis
Performance Evaluation
Federated Learning