Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26 Privacy IssuesModel evaluation methodsWatermarking Technology 2025.05.26 2025.05.28 Literature Database
TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26 Prompt InjectionModel Extraction AttackWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models Authors: Antti Koskela, Tejas Kulkarni | Published: 2025-05-26 Privacy IssuesDifferential PrivacyWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26 Model evaluation methodsLarge Language ModelWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Fixing 7,400 Bugs for 1$: Cheap Crash-Site Program Repair Authors: Han Zheng, Ilia Shumailov, Tianqi Fan, Aiden Hall, Mathias Payer | Published: 2025-05-19 LLM Securityバグ修正手法Watermarking Technology 2025.05.19 2025.05.28 Literature Database
MUBox: A Critical Evaluation Framework of Deep Machine Unlearning Authors: Xiang Li, Bhavani Thuraisingham, Wenqi Wei | Published: 2025-05-13 Class Based Forgetting EvaluationDetection of Poisonous DataWatermarking Technology 2025.05.13 2025.05.28 Literature Database
Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 Prompt leakingAttack MethodWatermarking Technology 2025.05.08 2025.05.12 Literature Database
On the Price of Differential Privacy for Hierarchical Clustering Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22 Graph ConstructionPrivacy protection frameworkWatermarking Technology 2025.04.22 2025.05.27 Literature Database
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21 Adversarial LearningGenerative ModelWatermarking Technology 2025.04.21 2025.05.27 Literature Database
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 Smart Contract AuditVulnerability ResearchWatermarking Technology 2025.04.21 2025.05.27 Literature Database