Defending against Indirect Prompt Injection by Instruction Detection Authors: Tongyu Wen, Chenglong Wang, Xiyuan Yang, Haoyu Tang, Yueqi Xie, Lingjuan Lyu, Zhicheng Dou, Fangzhao Wu | Published: 2025-05-08 | Updated: 2025-09-17 Prompt validationEvaluation MethodWatermarking Technology 2025.05.08 2025.09.19 Literature Database
Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 Prompt leakingAttack MethodWatermarking Technology 2025.05.08 2025.05.12 Literature Database
On the Price of Differential Privacy for Hierarchical Clustering Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22 Graph ConstructionPrivacy protection frameworkWatermarking Technology 2025.04.22 2025.05.27 Literature Database
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21 Adversarial LearningGenerative ModelWatermarking Technology 2025.04.21 2025.05.27 Literature Database
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 Smart Contract AuditVulnerability ResearchWatermarking Technology 2025.04.21 2025.05.27 Literature Database
How Effective Can Dropout Be in Multiple Instance Learning ? Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 | Updated: 2025-05-20 Performance EvaluationMulti-Class ClassificationWatermarking Technology 2025.04.21 2025.05.27 Literature Database
BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21 Prompt InjectionAttack DetectionWatermarking Technology 2025.04.18 2025.05.27 Literature Database
MiZero: The Shadowy Defender Against Text Style Infringements Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29 Prompt InjectionIntellectual Property ProtectionWatermarking Technology 2025.03.30 2025.05.31 Literature Database
Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 データ毒性Detection of Model Extraction AttacksWatermarking Technology 2025.03.28 2025.09.18 Literature Database
Benchmarking Android Malware Detection: Traditional vs. Deep Learning Models Authors: Guojun Liu, Doina Caragea, Xinming Ou, Sankardas Roy | Published: 2025-02-20 | Updated: 2025-07-30 データセットの影響Review and InvestigationWatermarking Technology 2025.02.20 2025.08.01 Literature Database