Literature Database

Verifying Differentially Private Median Estimation

Authors: Hyukjun Kwon, Chenglin Fan | Published: 2025-05-22
Privacy Assessment
Efficient Proof System
Differential Privacy

A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles

Authors: Md Ashraf Uddin, Nam H. Chu, Reza Rafeh, Mutaz Barika | Published: 2025-05-22
Attack Type
Federated Learning
階層型分類モデル

Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval

Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21
RAG
Large Language Model
Defense Mechanism

Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses

Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21
Alignment
Prompt Injection
Defense Mechanism

Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries

Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21
RAG
Poisoning attack on RAG
Privacy Loss Analysis

Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs

Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21
Text Generation Method
Prompt leaking
Vulnerability of Visualization

Adaptive Plan-Execute Framework for Smart Contract Security Auditing

Authors: Zhiyuan Wei, Jing Sun, Zijian Zhang, Zhe Hou, Zixiao Zhao | Published: 2025-05-21 | Updated: 2025-05-22
RAG
Prompt leaking
Dynamic Analysis

A Linear Approach to Data Poisoning

Authors: Diego Granziol, Donald Flynn | Published: 2025-05-21
Poisoning
Dynamic Analysis
Statistical Analysis

A Survey On Secure Machine Learning

Authors: Taobo Liao, Taoran Li, Prathamesh Nadkarni | Published: 2025-05-21
Privacy Assessment
Membership Inference
暗号化スキームの詳細

PsyScam: A Benchmark for Psychological Techniques in Real-World Scams

Authors: Shang Ma, Tianyi Ma, Jiahao Liu, Wei Song, Zhenkai Liang, Xusheng Xiao, Yanfang Ye | Published: 2025-05-21 | Updated: 2025-09-22
Phishing Attack
心理的手法
評価メトリクス