The Steganographic Potentials of Language Models Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06 RAGAuthor ContributionWatermark 2025.05.06 2025.05.27 Literature Database
Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control Authors: Hannah Cyberey, David Evans | Published: 2025-04-23 Prompt InjectionPsychological ManipulationWatermark 2025.04.23 2025.05.27 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23 Privacy-Preserving Data MiningMembership InferenceWatermark 2025.04.23 2025.05.27 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 Network Threat DetectionMalware Detection MethodWatermark 2025.04.23 2025.05.27 Literature Database
PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07 Model Performance EvaluationLarge Language ModelWatermark 2025.04.02 2025.05.27 Literature Database
Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24 AlignmentPrivacy-Preserving Data MiningWatermark 2025.02.10 2025.05.27 Literature Database
Adversarial Reprogramming of Neural Networks Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29 Certified RobustnessAdversarial ExampleWatermark 2018.06.28 2025.05.28 Literature Database
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10 Certified RobustnessAdversarial attackWatermark 2018.04.10 2025.05.28 Literature Database
Robust Decentralized Learning Using ADMM with Unreliable Agents Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21 Robustness Improvement MethodConvergence PropertyWatermark 2017.10.14 2025.05.28 Literature Database