PAC-Private Responses with Adversarial Composition Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20 Trigger DetectionPrivacy ProtectionDifferential Privacy 2026.01.20 2026.01.22 Literature Database
Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs Authors: Venkata Tanuja Madireddy | Published: 2025-12-11 グラフ分析Trigger Detection行動分析手法 2025.12.11 2025.12.13 Literature Database
Subtract the Corruption: Training-Data-Free Corrective Machine Unlearning using Task Arithmetic Authors: Mostafa Mozafari, Farooq Ahmad Wani, Maria Sofia Bucarelli, Fabrizio Silvestri | Published: 2025-11-24 Trigger DetectionBackdoor DetectionAdaptive Retraining Mechanism 2025.11.24 2025.11.26 Literature Database
Dynamic Black-box Backdoor Attacks on IoT Sensory Data Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18 Trigger DetectionBackdoor AttackGenerative Model 2025.11.18 2025.11.20 Literature Database
Robust Client-Server Watermarking for Split Federated Learning Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17 Trigger DetectionPrivacy TechniqueWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17 Trigger DetectionBackdoor AttackWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16 Trigger DetectionBackdoor DetectionBackdoor Attack 2025.11.16 2025.11.18 Literature Database
Toward Efficient Inference Attacks: Shadow Model Sharing via Mixture-of-Experts Authors: Li Bai, Qingqing Ye, Xinwei Zhang, Sen Zhang, Zi Liang, Jianliang Xu, Haibo Hu | Published: 2025-10-15 Trigger DetectionModel Architecture攻撃モデルの訓練 2025.10.15 2025.10.17 Literature Database
Fairness-Constrained Optimization Attack in Federated Learning Authors: Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy | Published: 2025-10-14 Trigger DetectionBiasFederated Learning 2025.10.14 2025.10.16 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database