Traveling Salesman-Based Token Ordering Improves Stability in Homomorphically Encrypted Language Models Authors: Donghwan Rho, Sieun Seo, Hyewon Sung, Chohong Min, Ernest K. Ryu | Published: 2025-10-14 Token Distribution AnalysisMembership InferenceLarge Language Model 2025.10.14 2025.10.16 Literature Database
SeedPrints: Fingerprints Can Even Tell Which Seed Your Large Language Model Was Trained From Authors: Yao Tong, Haonan Wang, Siquan Li, Kenji Kawaguchi, Tianyang Hu | Published: 2025-09-30 Token Distribution AnalysisHallucinationModel Performance Evaluation 2025.09.30 2025.10.02 Literature Database
LLM Embedding-based Attribution (LEA): Quantifying Source Contributions to Generative Model’s Response for Vulnerability Analysis Authors: Reza Fayyazi, Michael Zuzak, Shanchieh Jay Yang | Published: 2025-06-12 | Updated: 2025-09-03 RAGToken Distribution AnalysisVulnerability Analysis 2025.06.12 2025.09.05 Literature Database
Toward More Generalized Malicious URL Detection Models Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09 Token Distribution AnalysisBiasImpact of Generalization 2022.02.21 2025.05.28 Literature Database
Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction Authors: Zeki Bilgin | Published: 2021-05-07 Code Change AnalysisToken Distribution AnalysisVulnerability Analysis 2021.05.07 2025.05.28 Literature Database