Decentralized Multi-Agent System with Trust-Aware Communication Authors: Yepeng Ding, Ahmed Twabi, Junwei Yu, Lingfeng Zhang, Tohru Kondo, Hiroyuki Sato | Published: 2025-12-02 Secure Communication ChannelPrivacy ManagementBlockchain Integration 2025.12.02 2025.12.04 Literature Database
OmniGuard: Unified Omni-Modal Guardrails with Deliberate Reasoning Authors: Boyu Zhu, Xiaofei Wen, Wenjie Jacky Mo, Tinghui Zhu, Yanan Xie, Peng Qi, Muhao Chen | Published: 2025-12-02 Privacy Managementマルチモーダル安全性Ethical Considerations 2025.12.02 2025.12.04 Literature Database
Enterprise AI Must Enforce Participant-Aware Access Control Authors: Shashank Shreedhar Bhatt, Tanmay Rajore, Khushboo Aggarwal, Ganesh Ananthanarayanan, Ranveer Chandra, Nishanth Chandran, Suyash Choudhury, Divya Gupta, Emre Kiciman, Sumit Kumar Pandey, Srinath Setty, Rahul Sharma, Teijia Zhao | Published: 2025-09-18 Security AnalysisPrivacy ManagementPrompt leaking 2025.09.18 2025.09.20 Literature Database
Mind Your Server: A Systematic Study of Parasitic Toolchain Attacks on the MCP Ecosystem Authors: Shuli Zhao, Qinsheng Hou, Zihan Zhan, Yanhao Wang, Yuchong Xie, Yu Guo, Libo Chen, Shenghong Li, Zhi Xue | Published: 2025-09-08 Data LeakagePrivacy ManagementVulnerability Management 2025.09.08 2025.09.10 Literature Database
Mind the Third Eye! Benchmarking Privacy Awareness in MLLM-powered Smartphone Agents Authors: Zhixin Lin, Jungang Li, Shidong Pan, Yibo Shi, Yue Yao, Dongliang Xu | Published: 2025-08-27 Indirect Prompt InjectionPrivacy ManagementEducation and Follow-up 2025.08.27 2025.08.29 Literature Database
SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26 Security MetricPrivacy ManagementWatermark 2025.08.26 2025.08.28 Literature Database
Unlearning Isn’t Deletion: Investigating Reversibility of Machine Unlearning in LLMs Authors: Xiaoyu Xu, Xiang Yue, Yang Liu, Qingqing Ye, Haibo Hu, Minxin Du | Published: 2025-05-22 Bias Detection in AI OutputPrivacy ManagementMachine learning 2025.05.22 2025.05.28 Literature Database
Web IP at Risk: Prevent Unauthorized Real-Time Retrieval by Large Language Models Authors: Yisheng Zhong, Yizhu Wen, Junfeng Guo, Mehran Kafai, Heng Huang, Hanqing Guo, Zhuangdi Zhu | Published: 2025-05-19 LLM SecurityIndirect Prompt InjectionPrivacy Management 2025.05.19 2025.05.28 Literature Database
Reconciling Privacy and Explainability in High-Stakes: A Systematic Inquiry Authors: Supriya Manna, Niladri Sett | Published: 2024-12-30 | Updated: 2025-05-22 Privacy ManagementRobust explainabilityDifferential Privacy 2024.12.30 2025.05.28 Literature Database
Model-based Large Language Model Customization as Service Authors: Zhaomin Wu, Jizhou Guo, Junyi Hou, Bingsheng He, Lixin Fan, Qiang Yang | Published: 2024-10-14 | Updated: 2025-05-22 Text Generation MethodPrivacy ManagementDifferential Privacy 2024.10.14 2025.05.28 Literature Database