BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05 DID文書構築Trust EvaluationWatermark 2025.08.02 2025.08.07 Literature Database
Watermarking Degrades Alignment in Language Models: Analysis and Mitigation Authors: Apurv Verma, NhatHai Phan, Shubhendu Trivedi | Published: 2025-06-04 | Updated: 2025-07-10 Performance Evaluation MetricsDigital Watermarking for Generative AIWatermark 2025.06.04 2025.07.12 Literature Database
SALAD: Systematic Assessment of Machine Unlearning on LLM-Aided Hardware Design Authors: Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-06-02 | Updated: 2025-08-05 Data-Driven Vulnerability AssessmentPrompt leakingWatermark 2025.06.02 2025.08.07 Literature Database
The Steganographic Potentials of Language Models Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06 RAGAuthor ContributionWatermark 2025.05.06 2025.05.27 Literature Database
Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control Authors: Hannah Cyberey, David Evans | Published: 2025-04-23 Prompt InjectionPsychological ManipulationWatermark 2025.04.23 2025.05.27 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23 Privacy-Preserving Data MiningMembership InferenceWatermark 2025.04.23 2025.05.27 Literature Database
A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 Network Threat DetectionMalware Detection MethodWatermark 2025.04.23 2025.05.27 Literature Database
PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07 Model Performance EvaluationLarge Language ModelWatermark 2025.04.02 2025.05.27 Literature Database
Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25 Backdoor AttackPrompt InjectionWatermark 2025.02.28 2025.08.27 Literature Database