Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 Algorithm DesignPrivacy Design PrinciplesWatermark Design 2025.08.18 2025.08.20 Literature Database
Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13 Security AssuranceReconstruction AttackWatermark Design 2025.08.13 2025.08.15 Literature Database
Attacks and Defenses Against LLM Fingerprinting Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12 Prompt InjectionReinforcement LearningWatermark Design 2025.08.12 2025.08.14 Literature Database
EditMF: Drawing an Invisible Fingerprint for Your Large Language Models Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12 Large Language ModelAuthor Attribution MethodWatermark Design 2025.08.12 2025.08.14 Literature Database
Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs) Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07 IoTネットワーク攻撃Performance Evaluation MethodWatermark Design 2025.08.07 2025.08.09 Literature Database
LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks Authors: Ruoxi Wang, Kun Li, Minghui Xu, Yue Zhang, Kaidi Xu, Chunchi Liu, Yinhao Xiao, Xiuzhen Cheng | Published: 2025-07-07 バイナリ解析Factors of Performance DegradationWatermark Design 2025.07.07 2025.07.09 Literature Database
FIDESlib: A Fully-Fledged Open-Source FHE Library for Efficient CKKS on GPUs Authors: Carlos Agulló-Domingo, Óscar Vera-López, Seyda Guzelhan, Lohit Daksha, Aymane El Jerari, Kaustubh Shivdikar, Rashmi Agrawal, David Kaeli, Ajay Joshi, José L. Abellán | Published: 2025-07-07 Memory EvaluationFactors of Performance DegradationWatermark Design 2025.07.07 2025.07.09 Literature Database
Bilateral Differentially Private Vertical Federated Boosted Decision Trees Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30 Privacy Risk ManagementDifferential PrivacyWatermark Design 2025.04.30 2025.05.27 Literature Database
Watermarking Needs Input Repetition Masking Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16 LLM Performance EvaluationPrompt validationWatermark Design 2025.04.16 2025.05.27 Literature Database
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 Privacy Enhancing ProtocolPerformance Evaluation MethodWatermark Design 2025.04.16 2025.05.27 Literature Database