Model Architecture

Security Assessment of DeepSeek and GPT Series Models against Jailbreak Attacks

Authors: Xiaodong Wu, Xiangman Li, Jianbing Ni | Published: 2025-06-23
Prompt Injection
Model Architecture
Large Language Model

DUMB and DUMBer: Is Adversarial Training Worth It in the Real World?

Authors: Francesco Marchiori, Marco Alecci, Luca Pajola, Mauro Conti | Published: 2025-06-23
Model Architecture
Certified Robustness
Adversarial Attack Analysis

JavelinGuard: Low-Cost Transformer Architectures for LLM Security

Authors: Yash Datta, Sharath Rajasekar | Published: 2025-06-09
Privacy Enhancing Technology
Prompt Injection
Model Architecture

On Large Language Models’ Hallucination with Regard to Known Facts

Authors: Che Jiang, Biqing Qi, Xiangyu Hong, Dayuan Fu, Yang Cheng, Fandong Meng, Mo Yu, Bowen Zhou, Jie Zhou | Published: 2024-03-29 | Updated: 2024-10-28
Hallucination
Detection of Hallucinations
Model Architecture

Self-Rewarding Language Models

Authors: Weizhe Yuan, Richard Yuanzhe Pang, Kyunghyun Cho, Xian Li, Sainbayar Sukhbaatar, Jing Xu, Jason Weston | Published: 2024-01-18 | Updated: 2024-02-08
Alignment
Model Architecture
Deep Learning

SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification

Authors: Xuemei Li, Huirong Fu | Published: 2023-11-19
Training Protocol
Model Architecture
Intrusion Detection System

FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework

Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17
Model Architecture
Attack Method
Evaluation Method

Investigating the Effect of Misalignment on Membership Privacy in the White-box Setting

Authors: Ana-Maria Cretu, Daniel Jones, Yves-Alexandre de Montjoye, Shruti Tople | Published: 2023-06-08 | Updated: 2024-03-12
Privacy Analysis
Membership Inference
Model Architecture

Deep Learning model integrity checking mechanism using watermarking technique

Authors: Shahinul Hoque, Farhin Farhad Riya, Yingyuan Yang, Jinyuan Sun | Published: 2023-01-29 | Updated: 2025-03-21
DNN IP Protection Method
Watermarking
Model Architecture

Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data

Authors: Leijie Zhang, Ye Shi, Yu-Cheng Chang, Chin-Teng Lin | Published: 2022-09-18
Algorithm
Model Architecture
Hierarchical Classification Methods