Watermark

Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance

Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23
Data Preprocessing
Secure Arithmetic Computation
Watermark

Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge

Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19
Secure Arithmetic Computation
Machine Learning Technology
Watermark

Efficient Jailbreak Mitigation Using Semantic Linear Classification in a Multi-Staged Pipeline

Authors: Akshaj Prashanth Rao, Advait Singh, Saumya Kumaar Saksena, Dhruv Kumar | Published: 2025-12-22
Prompt Injection
Watermark
Defense Mechanism

From Essence to Defense: Adaptive Semantic-aware Watermarking for Embedding-as-a-Service Copyright Protection

Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Xuebin Wang | Published: 2025-12-18
著作権保護
Watermark
Watermark Robustness

Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation

Authors: Yuxuan Qiao, Dongqin Liu, Hongchang Yang, Wei Zhou, Songlin Hu | Published: 2025-12-18
Data Leakage
Privacy-Preserving Machine Learning
Watermark

Privacy-Aware In-Context Learning for Large Language Models

Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17
Differential Privacy
Information Extraction
Watermark

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
Algorithm
安全性メカニズムの分析
Watermark

SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications

Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26
Security Metric
Privacy Management
Watermark

Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation

Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25
Data Generation Method
Training Method
Watermark

Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS

Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05
Reinforcement Learning Attack
Attack Action Model
Watermark