Causal-Guided Detoxify Backdoor Attack of Open-Weight LoRA Models Authors: Linzhi Chen, Yang Sun, Hongru Wei, Yuqi Chen | Published: 2025-12-22 Backdoor DetectionDetection of Model Extraction AttacksAdversarial Attack Assessment 2025.12.22 2025.12.24 Literature Database
PrivTune: Efficient and Privacy-Preserving Fine-Tuning of Large Language Models via Device-Cloud Collaboration Authors: Yi Liu, Weixiang Han, Chengjun Cai, Xingliang Yuan, Cong Wang | Published: 2025-12-09 Backdoor DetectionPrivacy AssurancePrivacy Analysis 2025.12.09 2025.12.11 Literature Database
Subtract the Corruption: Training-Data-Free Corrective Machine Unlearning using Task Arithmetic Authors: Mostafa Mozafari, Farooq Ahmad Wani, Maria Sofia Bucarelli, Fabrizio Silvestri | Published: 2025-11-24 Trigger DetectionBackdoor DetectionAdaptive Retraining Mechanism 2025.11.24 2025.11.26 Literature Database
The ‘Sure’ Trap: Multi-Scale Poisoning Analysis of Stealthy Compliance-Only Backdoors in Fine-Tuned Large Language Models Authors: Yuting Tan, Yi Huang, Zhuo Li | Published: 2025-11-16 Trigger DetectionBackdoor DetectionBackdoor Attack 2025.11.16 2025.11.18 Literature Database
RHINO: Guided Reasoning for Mapping Network Logs to Adversarial Tactics and Techniques with Large Language Models Authors: Fanchao Meng, Jiaping Gui, Yunbo Li, Yue Wu | Published: 2025-10-16 Network Traffic AnalysisBackdoor DetectionEvaluation Method 2025.10.16 2025.10.18 Literature Database
Who Speaks for the Trigger? Dynamic Expert Routing in Backdoored Mixture-of-Experts Transformers Authors: Xin Zhao, Xiaojun Chen, Bingshan Liu, Haoyu Gao, Zhendong Zhao, Yilong Chen | Published: 2025-10-15 Backdoor DetectionPrompt leakingLarge Language Model 2025.10.15 2025.10.17 Literature Database
DeepTrust: Multi-Step Classification through Dissimilar Adversarial Representations for Robust Android Malware Detection Authors: Daniel Pulido-Cortázar, Daniel Gibert, Felip Manyà | Published: 2025-10-14 Backdoor DetectionCertified RobustnessRobustness 2025.10.14 2025.10.16 Literature Database
New Machine Learning Approaches for Intrusion Detection in ADS-B Authors: Mikaëla Ngamboé, Jean-Simon Marrocco, Jean-Yves Ouattara, José M. Fernandez, Gabriela Nicolescu | Published: 2025-10-09 Backdoor DetectionPerformance Evaluation Metrics通信セキュリティ 2025.10.09 2025.10.11 Literature Database
A Systematic Evaluation of Parameter-Efficient Fine-Tuning Methods for the Security of Code LLMs Authors: Kiho Lee, Jungkon Kim, Doowon Kim, Hyoungshick Kim | Published: 2025-09-16 コード生成手法Backdoor Detection脆弱性検出手法 2025.09.16 2025.09.18 Literature Database
CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06 Backdoor DetectionPrivacy ProtectionDeep Learning Method 2025.08.17 2025.11.08 Literature Database