RLCracker: Exposing the Vulnerability of LLM Watermarks with Adaptive RL Attacks Authors: Hanbo Huang, Yiran Zhang, Hao Zheng, Xuan Gong, Yihan Li, Lin Liu, Shiyu Liang | Published: 2025-09-25 Disabling Safety Mechanisms of LLMPrompt InjectionWatermark Design 2025.09.25 2025.09.27 Literature Database
Cryptographic Backdoor for Neural Networks: Boon and Bane Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25 Trigger DetectionBackdoor AttackWatermark Design 2025.09.25 2025.09.27 Literature Database
Character-Level Perturbations Disrupt LLM Watermarks Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11 Attack MethodDigital Watermarking for Generative AIWatermark Design 2025.09.11 2025.09.13 Literature Database
Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18 Algorithm DesignPrivacy Design PrinciplesWatermark Design 2025.08.18 2025.08.20 Literature Database
Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13 Security AssuranceReconstruction AttackWatermark Design 2025.08.13 2025.08.15 Literature Database
Attacks and Defenses Against LLM Fingerprinting Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12 Prompt InjectionReinforcement LearningWatermark Design 2025.08.12 2025.08.14 Literature Database
EditMF: Drawing an Invisible Fingerprint for Your Large Language Models Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12 Large Language ModelAuthor Attribution MethodWatermark Design 2025.08.12 2025.08.14 Literature Database
Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs) Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07 IoTネットワーク攻撃Performance Evaluation MethodWatermark Design 2025.08.07 2025.08.09 Literature Database
LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks Authors: Ruoxi Wang, Kun Li, Minghui Xu, Yue Zhang, Kaidi Xu, Chunchi Liu, Yinhao Xiao, Xiuzhen Cheng | Published: 2025-07-07 バイナリ解析Factors of Performance DegradationWatermark Design 2025.07.07 2025.07.09 Literature Database
FIDESlib: A Fully-Fledged Open-Source FHE Library for Efficient CKKS on GPUs Authors: Carlos Agulló-Domingo, Óscar Vera-López, Seyda Guzelhan, Lohit Daksha, Aymane El Jerari, Kaustubh Shivdikar, Rashmi Agrawal, David Kaeli, Ajay Joshi, José L. Abellán | Published: 2025-07-07 Memory EvaluationFactors of Performance DegradationWatermark Design 2025.07.07 2025.07.09 Literature Database