Data Exfiltration by Compression Attack: Definition and Evaluation on Medical Image Data Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2025-11-26 データ流出に関する分析手法Data Flow AnalysisImage Processing 2025.11.26 2025.11.28 Literature Database
Prompt Flow Integrity to Prevent Privilege Escalation in LLM Agents Authors: Juhee Kim, Woohyuk Choi, Byoungyoung Lee | Published: 2025-03-17 | Updated: 2025-04-21 Indirect Prompt InjectionData Flow AnalysisAttack Method 2025.03.17 2025.05.27 Literature Database
Deep Learning Application in Security and Privacy — Theory and Practice: A Position Paper Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis | Published: 2018-12-01 Data Flow AnalysisGeneralization PerformanceLegal Compliance 2018.12.01 2025.05.28 Literature Database
PIDS – A Behavioral Framework for Analysis and Detection of Network Printer Attacks Authors: Asaf Hecht, Adi Sagi, Yuval Elovici | Published: 2018-06-27 FDI Attack Detection MethodsData Flow AnalysisPrinter Security 2018.06.27 2025.05.28 Literature Database
Tokenized Data Markets Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31 Data Flow AnalysisVoting MechanismWatermark Evaluation 2018.05.31 2025.05.28 Literature Database