Algorithm

PAC to the Future: Zero-Knowledge Proofs of PAC Private Systems

Authors: Guilhem Repetto, Nojan Sheybani, Gabrielle De Micheli, Farinaz Koushanfar | Published: 2026-02-12
Algorithm
Privacy Assurance
Computational Consistency

Cachemir: Fully Homomorphic Encrypted Inference of Generative Large Language Model with KV Cache

Authors: Ye Yu, Yifan Zhou, Yi Chen, Pedro Soto, Wenjie Xiong, Meng Li | Published: 2026-02-12
Algorithm
Model DoS
Differential Privacy

PMark: Towards Robust and Distortion-free Semantic-level Watermarking with Channel Constraints

Authors: Jiahao Huo, Shuliang Liu, Bin Wang, Junyan Zhang, Yibo Yan, Aiwei Liu, Xuming Hu, Mingxun Zhou | Published: 2025-09-25
Algorithm
Digital Watermarking for Generative AI
Robustness of Watermarking Techniques

Coherence-driven inference for cybersecurity

Authors: Steve Huntsman | Published: 2025-09-23
Algorithm
Security Analysis
Information Gathering Methods

Variables Ordering Optimization in Boolean Characteristic Set Method Using Simulated Annealing and Machine Learning-based Time Prediction

Authors: Minzhong Luo, Yudong Sun, Yin Long | Published: 2025-09-18
Algorithm
Optimization Methods
Evaluation Method

Differential Privacy in Federated Learning: Mitigating Inference Attacks with Randomized Response

Authors: Ozer Ozturk, Busra Buyuktanir, Gozde Karatas Baydogmus, Kazim Yildiz | Published: 2025-09-17
Algorithm
Privacy Analysis
Differential Privacy

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
Algorithm
安全性メカニズムの分析
Watermark

An Unsupervised Learning Approach For A Reliable Profiling Of Cyber Threat Actors Reported Globally Based On Complete Contextual Information Of Cyber Attacks

Authors: Sawera Shahid, Umara Noor, Zahid Rashid | Published: 2025-09-15
Algorithm
Malware Classification
攻撃戦略分析

Inducing Uncertainty for Test-Time Privacy

Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15
Algorithm
Data Curation
Model evaluation methods

Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution

Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15
Algorithm
脅威モデリング自動化
Federated Learning