Data Generation

Attack Assessment and Augmented Identity Recognition for Human Skeleton Data

Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25
Data Generation
Robustness Improvement Method
Adversarial Learning

Walma: Learning to See Memory Corruption in WebAssembly

Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25
Data Generation
脆弱性検出手法
評価基準

How Vulnerable Are Edge LLMs?

Authors: Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu | Published: 2026-03-25
Indirect Prompt Injection
Data Generation
Prompt leaking

Ransomware 3.0: Self-Composing and LLM-Orchestrated

Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28
Data Generation
Attack Action Model
暗号化アルゴリズム

TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility

Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20
Data Generation
Privacy-Preserving Machine Learning
Membership Inference

Differentially Private Knowledge Distillation via Synthetic Text Generation

Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05
Data Generation
Privacy Protection Method
Model Performance Evaluation

Systematic Assessment of Tabular Data Synthesis Algorithms

Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13
Data Privacy Assessment
Data Generation
Privacy Protection Method

Estimation of conditional average treatment effects on distributed confidential data

Authors: Yuji Kawamata, Ryoki Motai, Yukihiko Okada, Akira Imakura, Tetsuya Sakurai | Published: 2024-02-05 | Updated: 2024-09-10
Watermarking
Simulation Result Evaluation
Data Generation

MetaAID 2.5: A Secure Framework for Developing Metaverse Applications via Large Language Models

Authors: Hongyin Zhu | Published: 2023-12-22
LLM Security
Data Generation
Prompt Injection

Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis

Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig | Published: 2023-12-21
Cybersecurity
Data Generation
Attack Graph Generation