Literature Database

Enhancing Adversarial Robustness with Conformal Prediction: A Framework for Guaranteed Model Reliability

Authors: Jie Bao, Chuangyin Dang, Rui Luo, Hanwei Zhang, Zhixin Zhou | Published: 2025-06-09
Certified Robustness
Robust Optimization
Adversarial Attack Methods

LLM Unlearning Should Be Form-Independent

Authors: Xiaotian Ye, Mengqi Zhang, Shu Wu | Published: 2025-06-09
Training Method
Certified Robustness
非意味的リダイレクション

“I wasn’t sure if this is indeed a security risk”: Data-driven Understanding of Security Issue Reporting in GitHub Repositories of Open Source npm Packages

Authors: Rajdeep Ghosh, Shiladitya De, Mainack Mondal | Published: 2025-06-09
API Security
Cyber Threat
Information Leakage Analysis

TimberStrike: Dataset Reconstruction Attack Revealing Privacy Leakage in Federated Tree-Based Systems

Authors: Marco Di Gennaro, Giovanni De Lucia, Stefano Longari, Stefano Zanero, Michele Carminati | Published: 2025-06-09
データ再構築攻撃
Privacy Enhancing Technology
Membership Inference

MalGEN: A Generative Agent Framework for Modeling Malicious Software in Cybersecurity

Authors: Bikash Saha, Sandeep Kumar Shukla | Published: 2025-06-09
Cyber Threat
Prompt Injection
マルウェア生成

Explainable AI for Enhancing IDS Against Advanced Persistent Kill Chain

Authors: Bassam Noori Shaker, Bahaa Al-Musawi, Mohammed Falih Hassan | Published: 2025-06-09
Cyber Threat
Anomaly Detection Algorithm
説明可能な機械学習

Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness

Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09
Information-Theoretic Approach
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques

Beyond Jailbreaks: Revealing Stealthier and Broader LLM Security Risks Stemming from Alignment Failures

Authors: Yukai Zhou, Sibei Yang, Wenjie Wang | Published: 2025-06-09
Cooperative Effects with LLM
Cyber Threat
Large Language Model

JavelinGuard: Low-Cost Transformer Architectures for LLM Security

Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09
Privacy Enhancing Technology
Prompt Injection
Model Architecture

Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test

Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11
API Security
Evaluation Method
Selection Method