Literature Database

TFHE-Coder: Evaluating LLM-agentic Fully Homomorphic Encryption Code Generation

Authors: Mayank Kumar, Jiaqi Xue, Mengxin Zheng, Qian Lou | Published: 2025-03-15
Few-Shot Learning
RAG
Deep Learning

Winning the MIDST Challenge: New Membership Inference Attacks on Diffusion Models for Tabular Data Synthesis

Authors: Xiaoyu Wu, Yifei Pang, Terrance Liu, Steven Wu | Published: 2025-03-15
Data Generation Method
Membership Disclosure Risk
Attack Method

Identifying Likely-Reputable Blockchain Projects on Ethereum

Authors: Cyrus Malik, Josef Bajada, Joshua Ellul | Published: 2025-03-14
Data Extraction and Analysis
Risk Analysis Method
Feature Engineering

Trust Under Siege: Label Spoofing Attacks against Machine Learning for Android Malware Detection

Authors: Tianwei Lan, Luca Demetrio, Farid Nait-Abdesselam, Yufei Han, Simone Aonzo | Published: 2025-03-14
Backdoor Attack
Label
Attack Method

Synthesizing Access Control Policies using Large Language Models

Authors: Adarsh Vatsa, Pratyush Patel, William Eiers | Published: 2025-03-14
Bias Detection in AI Output
Data Generation Method
Privacy Design Principles

Align in Depth: Defending Jailbreak Attacks via Progressive Answer Detoxification

Authors: Yingjie Zhang, Tong Liu, Zhe Zhao, Guozhu Meng, Kai Chen | Published: 2025-03-14
Disabling Safety Mechanisms of LLM
Prompt Injection
Malicious Prompt

Tempest: Autonomous Multi-Turn Jailbreaking of Large Language Models with Tree Search

Authors: Andy Zhou, Ron Arel | Published: 2025-03-13 | Updated: 2025-05-21
Disabling Safety Mechanisms of LLM
Attack Method
Generative Model

CASTLE: Benchmarking Dataset for Static Code Analyzers and LLMs towards CWE Detection

Authors: Richard A. Dubniczky, Krisztofer Zoltán Horvát, Tamás Bisztray, Mohamed Amine Ferrag, Lucas C. Cordeiro, Norbert Tihanyi | Published: 2025-03-12 | Updated: 2025-03-31
Security Metric
Prompt leaking
Vulnerability Mitigation Technique

Adv-CPG: A Customized Portrait Generation Framework with Facial Adversarial Attacks

Authors: Junying Wang, Hongyuan Zhang, Yuan Yuan | Published: 2025-03-11
Privacy Protection
Adversarial Example
Face Recognition System

Split-n-Chain: Privacy-Preserving Multi-Node Split Learning with Blockchain-Based Auditability

Authors: Mukesh Sahani, Binanda Sengupta | Published: 2025-03-10 | Updated: 2025-04-15
Performance Evaluation
Privacy Protection Method
Distributed Learning