SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26 Security MetricPrivacy ManagementWatermark 2025.08.26 2025.08.28 Literature Database
Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 Data Generation MethodTraining MethodWatermark 2025.08.25 2025.08.27 Literature Database
Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 Reinforcement Learning AttackAttack Action ModelWatermark 2025.08.05 2025.08.07 Literature Database
VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05 Prompt InjectionPrompt leakingWatermark 2025.08.05 2025.08.07 Literature Database
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04 RAGTraffic SimulationWatermark 2025.08.04 2025.08.06 Literature Database
SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 Blockchain StrategyVulnerability AnalysisWatermark 2025.08.04 2025.08.06 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database
FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04 DeepfakeDigital Watermarking for Generative AIWatermark 2025.08.04 2025.08.06 Literature Database
BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05 DID文書構築Trust EvaluationWatermark 2025.08.02 2025.08.07 Literature Database
Watermarking Degrades Alignment in Language Models: Analysis and Mitigation Authors: Apurv Verma, NhatHai Phan, Shubhendu Trivedi | Published: 2025-06-04 | Updated: 2025-07-10 Performance Evaluation MetricsDigital Watermarking for Generative AIWatermark 2025.06.04 2025.07.12 Literature Database