Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18 Robustness Verification MethodWatermark EvaluationAdaptive Misuse Detection 2025.11.18 2025.11.20 Literature Database
Robust Client-Server Watermarking for Split Federated Learning Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17 Trigger DetectionPrivacy TechniqueWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17 Trigger DetectionBackdoor AttackWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents Authors: Fuyao Zhang, Jiaming Zhang, Che Wang, Xiongtao Sun, Yurong Hao, Guowei Guan, Wenjie Li, Longtao Huang, Wei Yang Bryan Lim | Published: 2025-11-17 Privacy TechniqueGenerative ModelWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports Authors: Longfei Chen, Ruibin Yan, Taiyu Wong, Yiyang Chen, Chao Zhang | Published: 2025-11-17 Performance Evaluation Metrics自動生成フレームワークWatermark Evaluation 2025.11.17 2025.11.19 Literature Database
UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18 UAV個体識別Performance EvaluationWatermark Evaluation 2025.08.18 2025.08.20 Literature Database
Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28 エラー解析Process EnvironmentWatermark Evaluation 2025.07.28 2025.07.30 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 Reconstruction AttackAdversarial LearningWatermark Evaluation 2025.07.24 2025.07.26 Literature Database
Early Signs of Steganographic Capabilities in Frontier LLMs Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03 料理手順Watermark Evaluation隠れタスク評価 2025.07.03 2025.07.05 Literature Database
Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03 Privacy AnalysisAdversarial ExampleWatermark Evaluation 2025.06.03 2025.06.05 Literature Database