Literature Database

LLM Safety Alignment is Divergence Estimation in Disguise

Authors: Rajdeep Haldar, Ziyi Wang, Qifan Song, Guang Lin, Yue Xing | Published: 2025-02-02
Prompt Injection
Convergence Analysis
Large Language Model
Safety Alignment

Riddle Me This! Stealthy Membership Inference for Retrieval-Augmented Generation

Authors: Ali Naseh, Yuefeng Peng, Anshuman Suri, Harsh Chaudhari, Alina Oprea, Amir Houmansadr | Published: 2025-02-01 | Updated: 2025-06-30
RAG
Prompt leaking
Membership Inference

Byzantine-Resilient Zero-Order Optimization for Communication-Efficient Heterogeneous Federated Learning

Authors: Maximilian Egger, Mayank Bakshi, Rawad Bitar | Published: 2025-01-31
Convergence Guarantee
Convergence Analysis
Communication Efficiency

BounTCHA: A CAPTCHA Utilizing Boundary Identification in Guided Generative AI-extended Videos

Authors: Lehao Lin, Ke Wang, Maha Abdallah, Wei Cai | Published: 2025-01-30 | Updated: 2025-04-01
CAPTCHA
Video Reliability Assurance
Vulnerability of Adversarial Examples

Smoothed Embeddings for Robust Language Models

Authors: Ryo Hase, Md Rafi Ur Rashid, Ashley Lewis, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2025-01-27
Prompt Injection
Membership Inference
Adversarial Training

Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges

Authors: Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo | Published: 2025-01-27 | Updated: 2025-06-24
Energy Management
Model Extraction Attack
Adversarial Learning

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 | Updated: 2025-05-14
Network Threat Detection
User Activity Analysis
Improvement of Learning

I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic

Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05
Application Classification Method
Changes in User Behavior
Machine Learning Technology

Optimizing Privacy-Utility Trade-off in Decentralized Learning with Generalized Correlated Noise

Authors: Angelo Rodio, Zheng Chen, Erik G. Larsson | Published: 2025-01-24 | Updated: 2025-07-23
Characteristics of RDP
Efficiency of Distributed Learning
Differential Privacy

A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27
Privacy Issues
Watermarking Technology
Federated Learning