Attack-Resistant Uniform Fairness for Linear and Smooth Contextual Bandits Authors: Qingwen Zhang, Wenjia Wang | Published: 2026-02-04 Algorithm DesignRobust EstimationStatistical Methods 2026.02.04 2026.02.06 Literature Database
WorldCup Sampling for Multi-bit LLM Watermarking Authors: Yidan Wang, Yubing Ren, Yanan Cao, Li Guo | Published: 2026-02-02 LLM Performance EvaluationAlgorithm DesignWatermarking 2026.02.02 2026.02.04 Literature Database
Efficient Softmax Reformulation for Homomorphic Encryption via Moment Generating Function Authors: Hanjun Park, Byeong-Seo Min, Jiheon Woo, Min-Wook Jeong, Jongho Shin, Yongwoo Lee, Young-Sik Kim, Yongjune Kim | Published: 2026-02-02 Algorithm DesignEncryption Technology評価基準 2026.02.02 2026.02.04 Literature Database
Towards Zero Rotation and Beyond: Architecting Neural Networks for Fast Secure Inference with Homomorphic Encryption Authors: Yifei Cai, Yizhou Feng, Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2026-01-29 Algorithm DesignTrigger DetectionEncryption Technology 2026.01.29 2026.01.31 Literature Database
VerilogLAVD: LLM-Aided Rule Generation for Vulnerability Detection in Verilog Authors: Xiang Long, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18 Algorithm DesignHardware SecurityVulnerability Management 2025.08.18 2025.08.20 Literature Database
MAJIC: Markovian Adaptive Jailbreaking via Iterative Composition of Diverse Innovative Strategies Authors: Weiwei Qi, Shuo Shao, Wei Gu, Tianhang Zheng, Puning Zhao, Zhan Qin, Kui Ren | Published: 2025-08-18 Algorithm DesignPrompt InjectionAttack Type 2025.08.18 2025.08.20 Literature Database
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 Algorithm DesignPrivacy Design PrinciplesWatermark Design 2025.08.18 2025.08.20 Literature Database
Large Language Models are Few-shot Generators: Proposing Hybrid Prompt Algorithm To Generate Webshell Escape Samples Authors: Mingrui Ma, Lansheng Han, Chunjie Zhou | Published: 2024-02-12 | Updated: 2024-06-05 AlgorithmAlgorithm DesignDataset Generation 2024.02.12 2025.05.27 Literature Database
Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
On the Robustness of Epoch-Greedy in Multi-Agent Contextual Bandit Mechanisms Authors: Yinglun Xu, Bhuvesh Kumar, Jacob Abernethy | Published: 2023-07-15 Algorithm DesignRobustness EvaluationEfficient Resolution of Learning Tasks 2023.07.15 2025.05.28 Literature Database