Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12 Perturbation Method for Categorical VariablesFrameworkPerformance Evaluation Method 2025.08.12 2025.08.14 Literature Database
Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11 FrameworkPrompt InjectionPerformance Evaluation Method 2025.08.11 2025.08.13 Literature Database
ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12 FrameworkProactive Defense 2025.08.09 2025.08.14 Literature Database
MetaCipher: A Time-Persistent and Universal Multi-Agent Framework for Cipher-Based Jailbreak Attacks for LLMs Authors: Boyuan Chen, Minghao Shao, Abdul Basit, Siddharth Garg, Muhammad Shafique | Published: 2025-06-27 | Updated: 2025-08-13 FrameworkLarge Language Model脱獄攻撃手法 2025.06.27 2025.08.15 Literature Database
CADRE: Customizable Assurance of Data Readiness in Privacy-Preserving Federated Learning Authors: Kaveen Hiniduma, Zilinghan Li, Aditya Sinha, Ravi Madduri, Suren Byna | Published: 2025-05-28 | Updated: 2025-08-11 Data Management SystemFrameworkImbalanced Dataset 2025.05.28 2025.08.13 Literature Database
LLM-IFT: LLM-Powered Information Flow Tracking for Secure Hardware Authors: Nowfel Mashnoor, Mohammad Akyash, Hadi Kamali, Kimia Azar | Published: 2025-04-09 Disabling Safety Mechanisms of LLMFrameworkEfficient Configuration Verification 2025.04.09 2025.05.27 Literature Database
Secure On-Device Video OOD Detection Without Backpropagation Authors: Shawn Li, Peilin Cai, Yuxiao Zhou, Zhiyu Ni, Renjie Liang, You Qin, Yi Nian, Zhengzhong Tu, Xiyang Hu, Yue Zhao | Published: 2025-03-08 | Updated: 2025-03-17 Privacy Protection MethodFrameworkDeep Learning 2025.03.08 2025.05.27 Literature Database
EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database Authors: Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu | Published: 2025-01-09 | Updated: 2025-01-13 MPC AlgorithmSecure Logistic RegressionFramework 2025.01.09 2025.05.27 Literature Database
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li | Published: 2025-01-09 Privacy ProtectionFrameworkCryptography 2025.01.09 2025.05.27 Literature Database
AutoDFL: A Scalable and Automated Reputation-Aware Decentralized Federated Learning Authors: Meryem Malak Dif, Mouhamed Amine Bouchiha, Mourad Rabah, Yacine Ghamri-Doudane | Published: 2025-01-08 Privacy ProtectionFrameworkAttack Method 2025.01.08 2025.05.27 Literature Database