A Collaborative Intrusion Detection System Using Snort IDS Nodes Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23 Network Threat DetectionMalware Detection MethodWatermark 2025.04.23 2025.05.27 Literature Database
PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07 Model Performance EvaluationLarge Language ModelWatermark 2025.04.02 2025.05.27 Literature Database
Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25 Backdoor AttackPrompt InjectionWatermark 2025.02.28 2025.08.27 Literature Database
Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24 AlignmentPrivacy-Preserving Data MiningWatermark 2025.02.10 2025.05.27 Literature Database
PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05 Model InversionDifferential PrivacyWatermark 2024.12.19 2025.08.07 Literature Database
Adversarial Reprogramming of Neural Networks Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29 Certified RobustnessAdversarial ExampleWatermark 2018.06.28 2025.05.28 Literature Database
On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10 Certified RobustnessAdversarial attackWatermark 2018.04.10 2025.05.28 Literature Database
Robust Decentralized Learning Using ADMM with Unreliable Agents Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21 Robustness Improvement MethodConvergence PropertyWatermark 2017.10.14 2025.05.28 Literature Database
CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09 Convergence PropertyInterpretation MethodWatermark 2017.10.09 2025.05.28 Literature Database
Computation on Encrypted Data using Data Flow Authentication Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01 Information SecurityInformation Flow ControlWatermark 2017.10.01 2025.05.28 Literature Database