Towards Real-World Industrial-Scale Verification: LLM-Driven Theorem Proving on seL4 Authors: Jianyu Zhang, Fuyuan Zhang, Jiayi Lu, Jilin Hu, Xiaoyi Yin, Long Zhang, Feng Yang, Yongwang Zhao | Published: 2026-02-09 LLM Performance EvaluationProgram UnderstandingTransparency and Verification 2026.02.09 2026.02.11 Literature Database
Elevating Intrusion Detection and Security Fortification in Intelligent Networks through Cutting-Edge Machine Learning Paradigms Authors: Md Minhazul Islam Munna, Md Mahbubur Rahman, Jaroslav Frnda, Muhammad Shahid Anwar, Alpamis Kutlimuratov | Published: 2025-12-22 Relationship of AI SystemsEnsemble LearningTransparency and Verification 2025.12.22 2025.12.24 Literature Database
The Erasure Illusion: Stress-Testing the Generalization of LLM Forgetting Evaluation Authors: Hengrui Jia, Taoran Li, Jonas Guan, Varun Chandrasekaran | Published: 2025-12-22 LLM活用Challenges of Generative ModelsTransparency and Verification 2025.12.22 2025.12.24 Literature Database
Watermarking Large Language Models in Europe: Interpreting the AI Act in Light of Technology Authors: Thomas Souverain | Published: 2025-11-05 Digital Watermarking for Generative AIGenerative Model CharacteristicsTransparency and Verification 2025.11.05 2025.11.07 Literature Database
SME-TEAM: Leveraging Trust and Ethics for Secure and Responsible Use of AI and LLMs in SMEs Authors: Iqbal H. Sarker, Helge Janicke, Ahmad Mohsin, Leandros Maglaras | Published: 2025-09-12 | Updated: 2025-11-05 人間とAIの協力Creation of Fair AI ModelsTransparency and Verification 2025.09.12 2025.11.07 Literature Database
SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 Prompt Injection脱獄攻撃手法Transparency and Verification 2025.07.02 2025.07.04 Literature Database
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 Model Performance EvaluationWatermark EvaluationTransparency and Verification 2024.02.05 2025.05.27 Literature Database
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13 Model Performance EvaluationIntrusion Detection SystemTransparency and Verification 2022.07.13 2025.05.28 Literature Database
How to Peel a Million: Validating and Expanding Bitcoin Clusters Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27 Data Management SystemTransaction Profit and PerformanceTransparency and Verification 2022.05.27 2025.05.28 Literature Database
Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31 IoT SecurityApplication of XAITransparency and Verification 2021.10.31 2025.05.28 Literature Database