SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04 Blockchain StrategyVulnerability AnalysisWatermark 2025.08.04 2025.08.06 Literature Database
A Survey on Data Security in Large Language Models Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04 Indirect Prompt InjectionPrompt leakingWatermark 2025.08.04 2025.08.06 Literature Database
FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04 DeepfakeDigital Watermarking for Generative AIWatermark 2025.08.04 2025.08.06 Literature Database
BlockA2A: Towards Secure and Verifiable Agent-to-Agent Interoperability Authors: Zhenhua Zou, Zhuotao Liu, Lepeng Zhao, Qiuyang Zhan | Published: 2025-08-02 | Updated: 2025-08-05 DID文書構築Trust EvaluationWatermark 2025.08.02 2025.08.07 Literature Database
Watermarking Degrades Alignment in Language Models: Analysis and Mitigation Authors: Apurv Verma, NhatHai Phan, Shubhendu Trivedi | Published: 2025-06-04 | Updated: 2025-07-10 Performance Evaluation MetricsDigital Watermarking for Generative AIWatermark 2025.06.04 2025.07.12 Literature Database
SALAD: Systematic Assessment of Machine Unlearning on LLM-Aided Hardware Design Authors: Zeng Wang, Minghao Shao, Rupesh Karn, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-06-02 | Updated: 2025-08-05 Data-Driven Vulnerability AssessmentPrompt leakingWatermark 2025.06.02 2025.08.07 Literature Database
The Steganographic Potentials of Language Models Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06 RAGAuthor ContributionWatermark 2025.05.06 2025.05.27 Literature Database
Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control Authors: Hannah Cyberey, David Evans | Published: 2025-04-23 Prompt InjectionPsychological ManipulationWatermark 2025.04.23 2025.05.27 Literature Database
Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version) Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23 Network Threat DetectionResearch MethodologyWatermark 2025.04.23 2025.05.27 Literature Database
MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23 Privacy-Preserving Data MiningMembership InferenceWatermark 2025.04.23 2025.05.27 Literature Database