Literature Database

BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model

Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21
Trigger Detection
Backdoor Attack
Performance Evaluation

DELMAN: Dynamic Defense Against Large Language Model Jailbreaking with Model Editing

Authors: Yi Wang, Fenghua Weng, Sibei Yang, Zhan Qin, Minlie Huang, Wenjie Wang | Published: 2025-02-17 | Updated: 2025-05-29
LLM Security
Prompt Injection
Defense Method

Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomous LLM Agents

Authors: Rongwu Xu, Xiaojian Li, Shuo Chen, Wei Xu | Published: 2025-02-17 | Updated: 2025-03-23
Indirect Prompt Injection
Ethical Statement
Decision-Making Dynamics

QueryAttack: Jailbreaking Aligned Large Language Models Using Structured Non-natural Query Language

Authors: Qingsong Zou, Jingyu Xiao, Qing Li, Zhi Yan, Yuhang Wang, Li Xu, Wenxuan Wang, Kuofeng Gao, Ruoyu Li, Yong Jiang | Published: 2025-02-13 | Updated: 2025-05-26
Disabling Safety Mechanisms of LLM
Prompt leaking
教育的分析

A hierarchical approach for assessing the vulnerability of tree-based classification models to membership inference attack

Authors: Richard J. Preen, Jim Smith | Published: 2025-02-13 | Updated: 2025-06-12
Privacy Protection Method
Model Extraction Attack
Risk Assessment

RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning

Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16
Privacy Enhancing Protocol
Performance Evaluation Method
Federated Learning

RESIST: Resilient Decentralized Learning Using Consensus Gradient Descent

Authors: Cheng Fang, Rishabh Dixit, Waheed U. Bajwa, Mert Gurbuzbalaban | Published: 2025-02-11
MITM Attack
Convergence Analysis

Trustworthy AI: Safety, Bias, and Privacy — A Survey

Authors: Xingli Fang, Jianwei Li, Varun Mulchandani, Jung-Eun Kim | Published: 2025-02-11 | Updated: 2025-06-11
Bias
Prompt leaking
Differential Privacy

Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs

Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07
LLM Application
Risk Analysis Method
Information Security

Membership Inference Risks in Quantized Models: A Theoretical and Empirical Study

Authors: Eric Aubinais, Philippe Formont, Pablo Piantanida, Elisabeth Gassiat | Published: 2025-02-10
Membership Inference
Quantization and Privacy