ReCopilot: Reverse Engineering Copilot in Binary Analysis Authors: Guoqiang Chen, Huiqi Sun, Daguang Liu, Zhiqi Wang, Qiang Wang, Bin Yin, Lu Liu, Lingyun Ying | Published: 2025-05-22 2025.05.22 文献データベース
SuperPure: Efficient Purification of Localized and Distributed Adversarial Patches via Super-Resolution GAN Models Authors: Hossein Khalili, Seongbin Park, Venkat Bollapragada, Nader Sehatbakhsh | Published: 2025-05-22 2025.05.22 文献データベース
Interpretable Anomaly Detection in Encrypted Traffic Using SHAP with Machine Learning Models Authors: Kalindi Singh, Aayush Kashyap, Aswani Kumar Cherukuri | Published: 2025-05-22 2025.05.22 文献データベース
Verifying Differentially Private Median Estimation Authors: Hyukjun Kwon, Chenglin Fan | Published: 2025-05-22 2025.05.22 文献データベース
A Scalable Hierarchical Intrusion Detection System for Internet of Vehicles Authors: Md Ashraf Uddin, Nam H. Chu, Reza Rafeh, Mutaz Barika | Published: 2025-05-22 2025.05.22 文献データベース
Scalable Defense against In-the-wild Jailbreaking Attacks with Safety Context Retrieval Authors: Taiye Chen, Zeming Wei, Ang Li, Yisen Wang | Published: 2025-05-21 2025.05.21 文献データベース
Alignment Under Pressure: The Case for Informed Adversaries When Evaluating LLM Defenses Authors: Xiaoxue Yang, Bozhidar Stevanoski, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2025-05-21 2025.05.21 文献データベース
Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign Queries Authors: Yuhao Wang, Wenjie Qu, Yanze Jiang, Zichen Liu, Yue Liu, Shengfang Zhai, Yinpeng Dong, Jiaheng Zhang | Published: 2025-05-21 2025.05.21 文献データベース
あなたは騙されない?ディープフェイクがもたらす偽情報とその対策 AI技術を利用して、実在する人物の顔や音声を模倣して偽コンテンツなどを作成する技術であるディープフェイクやその対策について解説します。 2025.05.21 一般読者向け解説記事
Blind Spot Navigation: Evolutionary Discovery of Sensitive Semantic Concepts for LVLMs Authors: Zihao Pan, Yu Tong, Weibin Wu, Jingyi Wang, Lifeng Chen, Zhe Zhao, Jiajia Wei, Yitong Qiao, Zibin Zheng | Published: 2025-05-21 2025.05.21 文献データベース