Algorithm Design

VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog

Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
Algorithm Design
Hardware Security
Vulnerability Management

MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies

Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18
Algorithm Design
Prompt Injection
Attack Type

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
Algorithm Design
Privacy Design Principles
Watermark Design

Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples

Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05
Algorithm
Algorithm Design
Dataset Generation

Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm

Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16
Algorithm
Algorithm Design
Privacy Protection Method

On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms

Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15
Algorithm Design
Robustness Evaluation
Efficient Resolution of Learning Tasks

Differentially Private Clustering in Data Streams

Authors: Alessandro Epasto, Tamalika Mukherjee, Peilin Zhong | Published: 2023-07-14 | Updated: 2024-01-08
Algorithm Design
Scalability Analysis
Data Obfuscation

Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases

Authors: Sajani Vithana, Sennur Ulukus | Published: 2023-07-12
Algorithm Design
Data Integrity Constraints
Efficiency Evaluation

ConFL: Constraint-guided Fuzzing for Machine Learning Framework

Authors: Zhao Liu, Quanchen Zou, Tian Yu, Xuan Wang, Guozhu Meng, Kai Chen, Deyue Zhang | Published: 2023-07-11
Algorithm Design
Fuzzing
Performance Evaluation

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08
Algorithm Design
Security Assurance
Data Obfuscation