Backdoor Detection

Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models

Authors: Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen | Published: 2025-12-22
Backdoor Detection
Detection of Model Extraction Attacks
Adversarial Attack Assessment

PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration

Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09
Backdoor Detection
Privacy Assurance
Privacy Analysis

Subtract the Corruption: Training-Data-Free Corrective Machine Unlearning using Task Arithmetic

Authors: Mostafa Mozafari, Farooq Ahmad Wani, Maria Sofia Bucarelli, Fabrizio Silvestri | Published: 2025-11-24
Trigger Detection
Backdoor Detection
Adaptive Retraining Mechanism

The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models

Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16
Trigger Detection
Backdoor Detection
Backdoor Attack

RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models

Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16
Network Traffic Analysis
Backdoor Detection
Evaluation Method

Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers

Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15
Backdoor Detection
Prompt leaking
Large Language Model

DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection

Authors: Daniel Pulido-Cortázar, Daniel Gibert, Felip Manyà | Published: 2025-10-14
Backdoor Detection
Certified Robustness
Robustness

New Machine Learning Approaches for Intrusion Detection in ADS-B

Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09
Backdoor Detection
Performance Evaluation Metrics
通信セキュリティ

A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs

Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16
コード生成手法
Backdoor Detection
脆弱性検出手法

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning

Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06
Backdoor Detection
Privacy Protection
Deep Learning Method