VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Algorithm DesignHardware SecurityVulnerability Management 2025.08.18 2025.08.20 Literature Database
MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18 Algorithm DesignPrompt InjectionAttack Type 2025.08.18 2025.08.20 Literature Database
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 Algorithm DesignPrivacy Design PrinciplesWatermark Design 2025.08.18 2025.08.20 Literature Database
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15 Algorithm DesignRobustness EvaluationEfficient Resolution of Learning Tasks 2023.07.15 2025.05.28 Literature Database
Differentially Private Clustering in Data Streams Authors: Alessandro Epasto, Tamalika Mukherjee, Peilin Zhong | Published: 2023-07-14 | Updated: 2024-01-08 Algorithm DesignScalability AnalysisData Obfuscation 2023.07.14 2025.05.28 Literature Database
Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases Authors: Sajani Vithana, Sennur Ulukus | Published: 2023-07-12 Algorithm DesignData Integrity ConstraintsEfficiency Evaluation 2023.07.12 2025.05.28 Literature Database
ConFL: Constraint-guided Fuzzing for Machine Learning Framework Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11 Algorithm DesignFuzzingPerformance Evaluation 2023.07.11 2025.05.28 Literature Database
Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08 Algorithm DesignSecurity AssuranceData Obfuscation 2023.07.08 2025.05.28 Literature Database