SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 Prompt Injection脱獄攻撃手法Transparency and Verification 2025.07.02 2025.07.04 Literature Database
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 Model Performance EvaluationWatermark EvaluationTransparency and Verification 2024.02.05 2025.05.27 Literature Database
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13 Model Performance EvaluationIntrusion Detection SystemTransparency and Verification 2022.07.13 2025.05.28 Literature Database
How to Peel a Million: Validating and Expanding Bitcoin Clusters Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27 Data Management SystemTransaction Profit and PerformanceTransparency and Verification 2022.05.27 2025.05.28 Literature Database
Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31 IoT SecurityApplication of XAITransparency and Verification 2021.10.31 2025.05.28 Literature Database
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 Backdoor AttackDetection of Model Extraction AttacksTransparency and Verification 2018.09.03 2025.05.28 Literature Database