Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28 エラー解析Process EnvironmentWatermark Evaluation 2025.07.28 2025.07.30 Literature Database
On Reconstructing Training Data From Bayesian Posteriors and Trained Models Authors: George Wynne | Published: 2025-07-24 Reconstruction AttackAdversarial LearningWatermark Evaluation 2025.07.24 2025.07.26 Literature Database
Early Signs of Steganographic Capabilities in Frontier LLMs Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03 料理手順Watermark Evaluation隠れタスク評価 2025.07.03 2025.07.05 Literature Database
Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03 Privacy AnalysisAdversarial ExampleWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03 Prompt InjectionDynamic Analysis MethodWatermark Evaluation 2025.06.03 2025.06.05 Literature Database
UniNet: A Unified Multi-granular Traffic Modeling Framework for Network Security Authors: Binghui Wu, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2025-03-06 | Updated: 2025-07-03 IoT Traffic AnalysisModification of Network TrafficWatermark Evaluation 2025.03.06 2025.07.05 Literature Database
Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28 Privacy Risk ManagementPrompt leakingWatermark Evaluation 2025.02.22 2025.07.30 Literature Database
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 RAGWatermarkingWatermark Evaluation 2025.01.09 2025.05.27 Literature Database
RTLMarker: Protecting LLM-Generated RTL Copyright via a Hardware Watermarking Framework Authors: Kun Wang, Kaiyan Chang, Mengdi Wang, Xinqi Zou, Haobo Xu, Yinhe Han, Ying Wang | Published: 2025-01-05 Prompt InjectionWatermark RobustnessWatermark Evaluation 2025.01.05 2025.05.27 Literature Database
A Statistical Hypothesis Testing Framework for Data Misappropriation Detection in Large Language Models Authors: Yinpeng Cai, Lexin Li, Linjun Zhang | Published: 2025-01-05 FrameworkHypothesis TestingWatermark Evaluation 2025.01.05 2025.05.27 Literature Database