Efficient Jailbreak Mitigation Using Semantic Linear Classification in a Multi-Staged Pipeline Authors: Akshaj Prashanth Rao, Advait Singh, Saumya Kumaar Saksena, Dhruv Kumar | Published: 2025-12-22 Prompt InjectionWatermarkDefense Mechanism 2025.12.22 2025.12.24 Literature Database
From Essence to Defense: Adaptive Semantic-aware Watermarking for Embedding-as-a-Service Copyright Protection Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Xuebin Wang | Published: 2025-12-18 著作権保護WatermarkWatermark Robustness 2025.12.18 2025.12.20 Literature Database
Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation Authors: Yuxuan Qiao, Dongqin Liu, Hongchang Yang, Wei Zhou, Songlin Hu | Published: 2025-12-18 Data LeakagePrivacy-Preserving Machine LearningWatermark 2025.12.18 2025.12.20 Literature Database
Privacy-Aware In-Context Learning for Large Language Models Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17 Differential PrivacyInformation ExtractionWatermark 2025.09.17 2025.09.19 Literature Database
A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16 Algorithm安全性メカニズムの分析Watermark 2025.09.16 2025.09.18 Literature Database
SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26 Security MetricPrivacy ManagementWatermark 2025.08.26 2025.08.28 Literature Database
Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25 Data Generation MethodTraining MethodWatermark 2025.08.25 2025.08.27 Literature Database
Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05 Reinforcement Learning AttackAttack Action ModelWatermark 2025.08.05 2025.08.07 Literature Database
VFLAIR-LLM: A Comprehensive Framework and Benchmark for Split Learning of LLMs Authors: Zixuan Gu, Qiufeng Fan, Long Sun, Yang Liu, Xiaojun Ye | Published: 2025-08-05 Prompt InjectionPrompt leakingWatermark 2025.08.05 2025.08.07 Literature Database
Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04 RAGTraffic SimulationWatermark 2025.08.04 2025.08.06 Literature Database