DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT Authors: Baofu Han, Bing Li, Yining Qi, Raja Jurdak, Kaibin Huang, Chau Yuen | Published: 2025-07-22 Blockchain Strategy勾配分割手法Performance Evaluation 2025.07.22 2025.07.24 Literature Database
A Privacy-Preserving Indoor Localization System based on Hierarchical Federated Learning Authors: Masood Jan, Wafa Njima, Xun Zhang | Published: 2025-07-02 Privacy AssuranceDistributed LearningPerformance Evaluation 2025.07.02 2025.07.04 Literature Database
OBLIVIATE: Robust and Practical Machine Unlearning for Large Language Models Authors: Xiaoyu Xu, Minxin Du, Qingqing Ye, Haibo Hu | Published: 2025-05-07 Token Identification MethodModel DoSPerformance Evaluation 2025.05.07 2025.05.27 Literature Database
LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07 LLM SecurityPerformance EvaluationVulnerability Analysis 2025.05.07 2025.05.27 Literature Database
Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29 Online LearningPoisoningPerformance Evaluation 2025.04.29 2025.05.27 Literature Database
CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07 Program VerificationPerformance EvaluationVulnerability Analysis 2025.04.28 2025.05.27 Literature Database
Detecting Benchmark Contamination Through Watermarking Authors: Tom Sander, Pierre Fernandez, Saeed Mahloujifar, Alain Durmus, Chuan Guo | Published: 2025-02-24 | Updated: 2025-07-21 WatermarkingData Contamination DetectionPerformance Evaluation 2025.02.24 2025.07.23 Literature Database
BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21 Trigger DetectionBackdoor AttackPerformance Evaluation 2025.02.17 2025.07.23 Literature Database
In-Context Unlearning: Language Models as Few Shot Unlearners Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06 Data LeakagePerformance EvaluationMachine Learning Technology 2023.10.11 2025.05.28 Literature Database
A Semantic Invariant Robust Watermark for Large Language Models Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19 WatermarkingPrompt InjectionPerformance Evaluation 2023.10.10 2025.05.28 Literature Database