Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22 LLM SecurityAlignmentAdversarial Learning 2025.05.22 2025.05.28 Literature Database
BitHydra: Towards Bit-flip Inference Cost Attack against Large Language Models Authors: Xiaobei Yan, Yiming Li, Zhaoxin Fan, Han Qiu, Tianwei Zhang | Published: 2025-05-22 LLM SecurityText Generation MethodPrompt Injection 2025.05.22 2025.05.28 Literature Database
Finetuning-Activated Backdoors in LLMs Authors: Thibaud Gloaguen, Mark Vero, Robin Staab, Martin Vechev | Published: 2025-05-22 LLM SecurityBackdoor AttackPrompt Injection 2025.05.22 2025.05.28 Literature Database
CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from Harmful Fine-Tuning Authors: Biao Yi, Tiansheng Huang, Baolei Zhang, Tong Li, Lihai Nie, Zheli Liu, Li Shen | Published: 2025-05-22 AlignmentIndirect Prompt InjectionCalculation of Output Harmfulness 2025.05.22 2025.05.28 Literature Database
DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22 Fingerprinting MethodPrompt InjectionModel Identification 2025.05.22 2025.05.28 Literature Database
Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22 Data Origins and EvolutionパスワードセキュリティMachine Learning 2025.05.22 2025.05.28 Literature Database
ReCopilot: Reverse Engineering Copilot in Binary Analysis Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22 Alignmentバイナリ分析Dynamic Analysis 2025.05.22 2025.05.28 Literature Database
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 Adversarial LearningComputational ComplexityDefense Mechanism 2025.05.22 2025.05.28 Literature Database
Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22 Model InversionAnomaly Detection Algorithmloss of Interpretability 2025.05.22 2025.05.28 Literature Database
Verifying Differentially Private Median Estimation Authors: Hyukjun Kwon, Chenglin Fan | Published: 2025-05-22 Privacy AssessmentEfficient Proof SystemDifferential Privacy 2025.05.22 2025.05.28 Literature Database