PVMark: Enabling Public Verifiability for LLM Watermarking Schemes Authors: Haohua Duan, Liyao Xiang, Xin Zhang | Published: 2025-10-30 Model Extraction Attack公的検証可能性Watermarking Technology 2025.10.30 2025.11.01 Literature Database
Training-Free In-Context Forensic Chain for Image Manipulation Detection and Localization Authors: Rui Chen, Bin Liu, Changtao Miao, Xinghao Wang, Yi Li, Tao Gong, Qi Chu, Nenghai Yu | Published: 2025-10-11 | Updated: 2025-10-27 トリガーベースの透かし画像処理手法Watermarking Technology 2025.10.11 2025.10.29 Literature Database
LLM Jailbreak Detection for (Almost) Free! Authors: Guorui Chen, Yifan Xia, Xiaojun Jia, Zhijiang Li, Philip Torr, Jindong Gu | Published: 2025-09-18 Large Language ModelEvaluation MethodWatermarking Technology 2025.09.18 2025.09.20 Literature Database
Yet Another Watermark for Large Language Models Authors: Siyuan Bao, Ying Shi, Zhiguang Yang, Hanzhou Wu, Xinpeng Zhang | Published: 2025-09-16 Prompt leakingLarge Language ModelWatermarking Technology 2025.09.16 2025.09.18 Literature Database
ZKPROV: A Zero-Knowledge Approach to Dataset Provenance for Large Language Models Authors: Mina Namazi, Alexander Nemecek, Erman Ayday | Published: 2025-06-26 Privacy ProtectionLarge Language ModelWatermarking Technology 2025.06.26 2025.06.28 Literature Database
FicGCN: Unveiling the Homomorphic Encryption Efficiency from Irregular Graph Convolutional Networks Authors: Zhaoxuan Kan, Husheng Han, Shangyi Shi, Tenghui Hua, Hang Lu, Xiaowei Li, Jianan Mu, Xing Hu | Published: 2025-06-12 ノード最適化手法Privacy Enhancing TechnologyWatermarking Technology 2025.06.12 2025.06.14 Literature Database
Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26 Privacy IssuesModel evaluation methodsWatermarking Technology 2025.05.26 2025.05.28 Literature Database
TrojanStego: Your Language Model Can Secretly Be A Steganographic Privacy Leaking Agent Authors: Dominik Meier, Jan Philip Wahle, Paul Röttger, Terry Ruas, Bela Gipp | Published: 2025-05-26 Prompt InjectionModel Extraction AttackWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models Authors: Antti Koskela, Tejas Kulkarni | Published: 2025-05-26 Privacy IssuesDifferential PrivacyWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26 Model evaluation methodsLarge Language ModelWatermarking Technology 2025.05.26 2025.05.28 Literature Database