Attack Assessment and Augmented Identity Recognition for Human Skeleton Data Authors: Joseph G. Zalameda, Megan A. Witherow, Alexander M. Glandon, Jose Aguilera, Khan M. Iftekharuddin | Published: 2026-03-25 Data GenerationRobustness Improvement MethodAdversarial Learning 2026.03.25 2026.03.26 Literature Database
Walma: Learning to See Memory Corruption in WebAssembly Authors: Oussama Draissi, Mark Günzel, Ahmad-Reza Sadeghi, Lucas Davi | Published: 2026-03-25 Data Generation脆弱性検出手法評価基準 2026.03.25 2026.03.26 Literature Database
How Vulnerable Are Edge LLMs? Authors: Ao Ding, Hongzong Li, Zi Liang, Zhanpeng Shi, Shuxin Zhuang, Shiqin Tang, Rong Feng, Ping Lu | Published: 2026-03-25 Indirect Prompt InjectionData GenerationPrompt leaking 2026.03.25 2026.03.26 Literature Database
Ransomware 3.0: Self-Composing and LLM-Orchestrated Authors: Md Raz, Meet Udeshi, P. V. Sai Charan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri | Published: 2025-08-28 Data GenerationAttack Action Model暗号化アルゴリズム 2025.08.28 2025.09.01 Literature Database
TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20 Data GenerationPrivacy-Preserving Machine LearningMembership Inference 2025.03.20 2025.05.27 Literature Database
Differentially Private Knowledge Distillation via Synthetic Text Generation Authors: James Flemings, Murali Annavaram | Published: 2024-03-01 | Updated: 2024-06-05 Data GenerationPrivacy Protection MethodModel Performance Evaluation 2024.03.01 2025.05.27 Literature Database
Systematic Assessment of Tabular Data Synthesis Algorithms Authors: Yuntao Du, Ninghui Li | Published: 2024-02-09 | Updated: 2024-04-13 Data Privacy AssessmentData GenerationPrivacy Protection Method 2024.02.09 2025.05.27 Literature Database
Estimation of conditional average treatment effects on distributed confidential data Authors: Yuji Kawamata, Ryoki Motai, Yukihiko Okada, Akira Imakura, Tetsuya Sakurai | Published: 2024-02-05 | Updated: 2024-09-10 WatermarkingSimulation Result EvaluationData Generation 2024.02.05 2025.05.27 Literature Database
MetaAID 2.5: A Secure Framework for Developing Metaverse Applications via Large Language Models Authors: Hongyin Zhu | Published: 2023-12-22 LLM SecurityData GenerationPrompt Injection 2023.12.22 2025.05.27 Literature Database
Investigation of Multi-stage Attack and Defense Simulation for Data Synthesis Authors: Ömer Sen, Bozhidar Ivanov, Martin Henze, Andreas Ulbig | Published: 2023-12-21 CybersecurityData GenerationAttack Graph Generation 2023.12.21 2025.05.27 Literature Database