ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural Networks Authors: Zhan Cheng, Bolin Shen, Tianming Sha, Yuan Gao, Shibo Li, Yushun Dong | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
Empirical Analysis of Privacy-Fairness-Accuracy Trade-offs in Federated Learning: A Step Towards Responsible AI Authors: Dawood Wasif, Dian Chen, Sindhuja Madabushi, Nithin Alluru, Terrence J. Moore, Jin-Hee Cho | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
BadToken: Token-level Backdoor Attacks to Multi-modal Large Language Models Authors: Zenghui Yuan, Jiawen Shi, Pan Zhou, Neil Zhenqiang Gong, Lichao Sun | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
TVineSynth: A Truncated C-Vine Copula Generator of Synthetic Tabular Data to Balance Privacy and Utility Authors: Elisabeth Griesbauer, Claudia Czado, Arnoldo Frigessi, Ingrid Hobæk Haff | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
Digital Asset Data Lakehouse. The concept based on a blockchain research center Authors: Raul Cristian Bag | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
DroidTTP: Mapping Android Applications with TTP for Cyber Threat Intelligence Authors: Dincy R Arikkat, Vinod P., Rafidha Rehiman K. A., Serena Nicolazzo, Marco Arazzi, Antonino Nocera, Mauro Conti | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
Detecting LLM-Written Peer Reviews Authors: Vishisht Rao, Aounon Kumar, Himabindu Lakkaraju, Nihar B. Shah | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
AutoRedTeamer: Autonomous Red Teaming with Lifelong Attack Integration Authors: Andy Zhou, Kevin Wu, Francesco Pinto, Zhaorun Chen, Yi Zeng, Yu Yang, Shuang Yang, Sanmi Koyejo, James Zou, Bo Li | Published: 2025-03-20 2025.03.20 2025.04.03 文献データベース
Towards Understanding the Safety Boundaries of DeepSeek Models: Evaluation and Findings Authors: Zonghao Ying, Guangyi Zheng, Yongxin Huang, Deyue Zhang, Wenxin Zhang, Quanchen Zou, Aishan Liu, Xianglong Liu, Dacheng Tao | Published: 2025-03-19 2025.03.19 2025.04.03 文献データベース
Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19 2025.03.19 2025.04.03 文献データベース