Fine-Grained Privacy Extraction from Retrieval-Augmented Generation Systems via Knowledge Asymmetry Exploitation Authors: Yufei Chen, Yao Wang, Haibin Zhang, Tao Gu | Published: 2025-07-31 Poisoning attack on RAGPrivacy AssessmentRobustness of Watermarking Techniques 2025.07.31 2025.08.02 Literature Database
Empirical Evaluation of Concept Drift in ML-Based Android Malware Detection Authors: Ahmed Sabbah, Radi Jarrar, Samer Zein, David Mohaisen | Published: 2025-07-30 Drift Detection MethodBackdoor DetectionRobustness of Watermarking Techniques 2025.07.30 2025.08.01 Literature Database
Breaking Obfuscation: Cluster-Aware Graph with LLM-Aided Recovery for Malicious JavaScript Detection Authors: Zhihong Liang, Xin Wang, Zhenhuang Hu, Liangliang Song, Lin Chen, Jingjing Guo, Yanbin Wang, Ye Tian | Published: 2025-07-30 Program VerificationPrompt InjectionRobustness of Watermarking Techniques 2025.07.30 2025.08.01 Literature Database
SAEL: Leveraging Large Language Models with Adaptive Mixture-of-Experts for Smart Contract Vulnerability Detection Authors: Lei Yu, Shiqi Cheng, Zhirong Huang, Jingyuan Zhang, Chenjie Shen, Junyi Lu, Li Yang, Fengjun Zhang, Jiajia Ma | Published: 2025-07-30 Prompt leakingVulnerability detectionRobustness of Watermarking Techniques 2025.07.30 2025.08.01 Literature Database
Enhancing Watermarking Quality for LLMs via Contextual Generation States Awareness Authors: Peiru Yang, Xintian Li, Wanchun Ni, Jinhua Yin, Huili Wang, Guoshun Nan, Shangguang Wang, Yongfeng Huang, Tao Qi | Published: 2025-06-09 Information-Theoretic ApproachDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2025.06.09 2025.06.11 Literature Database
CEE: An Inference-Time Jailbreak Defense for Embodied Intelligence via Subspace Concept Rotation Authors: Jirui Yang, Zheyu Lin, Zhihui Lu, Yinggui Wang, Lei Wang, Tao Wei, Xin Du, Shuhan Yang | Published: 2025-04-15 | Updated: 2025-07-31 Prompt InjectionRobustness of Watermarking TechniquesDefense Effectiveness Analysis 2025.04.15 2025.08.02 Literature Database
Probabilistic Modeling of Jailbreak on Multimodal LLMs: From Quantification to Application Authors: Wenzhuo Xu, Zhipeng Wei, Xiongtao Sun, Zonghao Ying, Deyue Zhang, Dongdong Yang, Xiangzheng Zhang, Quanchen Zou | Published: 2025-03-10 | Updated: 2025-07-31 Prompt InjectionLarge Language ModelRobustness of Watermarking Techniques 2025.03.10 2025.08.02 Literature Database
Provable Robust Watermarking for AI-Generated Text Authors: Xuandong Zhao, Prabhanjan Ananth, Lei Li, Yu-Xiang Wang | Published: 2023-06-30 | Updated: 2023-10-13 Text Perturbation MethodDigital Watermarking for Generative AIRobustness of Watermarking Techniques 2023.06.30 2025.05.28 Literature Database
Improving Network Intrusion Detection Classifiers by Non-payload-Based Exploit-Independent Obfuscations: An Adversarial Approach Authors: Ivan Homoliak, Martin Teknos, Martín Ochoa, Dominik Breitenbacher, Saeid Hosseini, Petr Hanacek | Published: 2018-05-07 | Updated: 2018-12-12 CybersecurityAttack DetectionRobustness of Watermarking Techniques 2018.05.07 2025.05.28 Literature Database
Classification of Epileptic EEG Signals by Wavelet based CFC Authors: Amirmasoud Ahmadi, Mahsa Behroozi, Vahid Shalchyan, Mohammad Reza Daliri | Published: 2018-05-04 Performance Evaluation MetricsTime Series AnalysisRobustness of Watermarking Techniques 2018.05.04 2025.05.28 Literature Database