Enabling Regulatory Multi-Agent Collaboration: Architecture, Challenges, and Solutions Authors: Qinnan Hu, Yuntao Wang, Yuan Gao, Zhou Su, Linkang Du | Published: 2025-09-11 2025.09.11 文献データベース
Character-Level Perturbations Disrupt LLM Watermarks Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11 2025.09.11 文献データベース
AgriSentinel: Privacy-Enhanced Embedded-LLM Crop Disease Alerting System Authors: Chanti Raju Mylay, Bobin Deng, Zhipeng Cai, Honghui Xu | Published: 2025-09-11 2025.09.11 文献データベース
DP-FedLoRA: Privacy-Enhanced Federated Fine-Tuning for On-Device Large Language Models Authors: Honghui Xu, Shiva Shrestha, Wei Chen, Zhiyuan Li, Zhipeng Cai | Published: 2025-09-11 2025.09.11 文献データベース
Towards Confidential and Efficient LLM Inference with Dual Privacy Protection Authors: Honglan Yu, Yibin Wang, Feifei Dai, Dong Liu, Haihui Fan, Xiaoyan Gu | Published: 2025-09-11 2025.09.11 文献データベース
Architecting Resilient LLM Agents: A Guide to Secure Plan-then-Execute Implementations Authors: Ron F. Del Rosario, Klaudia Krawiecka, Christian Schroeder de Witt | Published: 2025-09-10 2025.09.10 文献データベース
Send to which account? Evaluation of an LLM-based Scambaiting System Authors: Hossein Siadati, Haadi Jafarian, Sima Jafarikhah | Published: 2025-09-10 2025.09.10 文献データベース
Efficient Decoding Methods for Language Models on Encrypted Data Authors: Matan Avitan, Moran Baruch, Nir Drucker, Itamar Zimerman, Yoav Goldberg | Published: 2025-09-10 2025.09.10 文献データベース
Phish-Blitz: Advancing Phishing Detection with Comprehensive Webpage Resource Collection and Visual Integrity Preservation Authors: Duddu Hriday, Aditya Kulkarni, Vivek Balachandran, Tamal Das | Published: 2025-09-10 2025.09.10 文献データベース
An Ethically Grounded LLM-Based Approach to Insider Threat Synthesis and Detection Authors: Haywood Gelman, John D. Hastings, David Kenley | Published: 2025-09-08 2025.09.08 文献データベース