Watermark

A Collaborative Intrusion Detection System Using Snort IDS Nodes

Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23
Network Threat Detection
Malware Detection Method
Watermark

PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization

Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07
Model Performance Evaluation
Large Language Model
Watermark

Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks

Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25
Backdoor Attack
Prompt Injection
Watermark

Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs

Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24
Alignment
Privacy-Preserving Data Mining
Watermark

PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks

Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05
Model Inversion
Differential Privacy
Watermark

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
Certified Robustness
Adversarial Example
Watermark

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
Certified Robustness
Adversarial attack
Watermark

Robust Decentralized Learning Using ADMM with Unreliable Agents

Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21
Robustness Improvement Method
Convergence Property
Watermark

CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions

Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09
Convergence Property
Interpretation Method
Watermark

Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01
Information Security
Information Flow Control
Watermark