Literature Database

Mitigating Fine-tuning Risks in LLMs via Safety-Aware Probing Optimization

Authors: Chengcan Wu, Zhixin Zhang, Zeming Wei, Yihao Zhang, Meng Sun | Published: 2025-05-22
LLM Security
Alignment
Adversarial Learning

BitHydra: Towards Bit-flip Inference Cost Attack against Large Language Models

Authors: Xiaobei Yan, Yiming Li, Zhaoxin Fan, Han Qiu, Tianwei Zhang | Published: 2025-05-22
LLM Security
Text Generation Method
Prompt Injection

Finetuning-Activated Backdoors in LLMs

Authors: Thibaud Gloaguen, Mark Vero, Robin Staab, Martin Vechev | Published: 2025-05-22
LLM Security
Backdoor Attack
Prompt Injection

CTRAP: Embedding Collapse Trap to Safeguard Large Language Models from Harmful Fine-Tuning

Authors: Biao Yi, Tiansheng Huang, Baolei Zhang, Tong Li, Lihai Nie, Zheli Liu, Li Shen | Published: 2025-05-22
Alignment
Indirect Prompt Injection
Calculation of Output Harmfulness

DuFFin: A Dual-Level Fingerprinting Framework for LLMs IP Protection

Authors: Yuliang Yan, Haochun Tang, Shuo Yan, Enyan Dai | Published: 2025-05-22
Fingerprinting Method
Prompt Injection
Model Identification

Password Strength Detection via Machine Learning: Analysis, Modeling, and Evaluation

Authors: Jiazhi Mo, Hailu Kuang, Xiaoqi Li | Published: 2025-05-22
Data Origins and Evolution
パスワードセキュリティ
Machine Learning

ReCopilot: Reverse Engineering Copilot in Binary Analysis

Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22
Alignment
バイナリ分析
Dynamic Analysis

SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models

Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22
Adversarial Learning
Computational Complexity
Defense Mechanism

Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models

Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22
Model Inversion
Anomaly Detection Algorithm
loss of Interpretability

Verifying Differentially Private Median Estimation

Authors: Hyukjun Kwon, Chenglin Fan | Published: 2025-05-22
Privacy Assessment
Efficient Proof System
Differential Privacy