Trigger Detection

Protection against Source Inference Attacks in Federated Learning

Authors: Andreas Athanasiou, Kangsoo Jung, Catuscia Palamidessi | Published: 2026-03-02
Secure Aggregation
Trigger Detection
Poisoning

BlackCATT: Black-box Collusion Aware Traitor Tracing in Federated Learning

Authors: Elena Rodríguez-Lois, Fabio Brau, Maura Pintor, Battista Biggio, Fernando Pérez-González | Published: 2026-02-12
データリークやモデルの問題に関する分析手法
Trigger Detection
Watermark Robustness

Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption

Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29
Algorithm Design
Trigger Detection
Encryption Technology

PAC-Private Responses with Adversarial Composition

Authors: Xiaochen Zhu, Mayuri Sridhar, Srinivas Devadas | Published: 2026-01-20
Trigger Detection
Privacy Protection
Differential Privacy

Graph Neural Network Based Adaptive Threat Detection for Cloud Identity and Access Management Logs

Authors: Venkata Tanuja Madireddy | Published: 2025-12-11
グラフ分析
Trigger Detection
行動分析手法

Subtract the Corruption: Training-Data-Free Corrective Machine Unlearning using Task Arithmetic

Authors: Mostafa Mozafari, Farooq Ahmad Wani, Maria Sofia Bucarelli, Fabrizio Silvestri | Published: 2025-11-24
Trigger Detection
Backdoor Detection
Adaptive Retraining Mechanism

Dynamic Black-box Backdoor Attacks on IoT Sensory Data

Authors: Ajesh Koyatan Chathoth, Stephen Lee | Published: 2025-11-18
Trigger Detection
Backdoor Attack
Generative Model

Robust Client-Server Watermarking for Split Federated Learning

Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17
Trigger Detection
Privacy Technique
Watermark Evaluation

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
Trigger Detection
Backdoor Attack
Watermark Evaluation

The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models

Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16
Trigger Detection
Backdoor Detection
Backdoor Attack