Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08 プロンプトリーキング攻撃手法透かし技術 2025.05.08 2025.05.12 Literature Database
On the Price of Differential Privacy for Hierarchical Clustering Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22 グラフ構築プライバシー保護フレームワーク透かし技術 2025.04.22 2025.05.12 Literature Database
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21 敵対的学習生成モデル透かし技術 2025.04.21 2025.05.12 Literature Database
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 スマートコントラクト監査脆弱性研究透かし技術 2025.04.21 2025.05.12 Literature Database
How Effective Can Dropout Be in Multiple Instance Learning ? Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 パフォーマンス評価マルチクラス分類透かし技術 2025.04.21 2025.05.12 Literature Database
BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21 プロンプトインジェクション攻撃検出透かし技術 2025.04.18 2025.05.12 Literature Database
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27 プライバシー問題透かし技術連合学習 2025.01.22 2025.05.12 Literature Database
ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07 テキストの摂動手法バックドアモデルの検知透かし技術 2024.12.30 2025.05.12 Literature Database
CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21 サイバー脅威インテリジェンスプロンプトリーキング透かし技術 2024.10.28 2025.05.12 Literature Database
Undetectable Watermarks for Language Models Authors: Miranda Christ, Sam Gunn, Or Zamir | Published: 2023-05-25 プロンプトリーキング生成AI向け電子透かし透かし技術 2023.05.25 2025.05.12 Literature Database