TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions Authors: Wang YuHang, Junkang Guo, Aolei Liu, Kaihao Wang, Zaitong Wu, Zhenyu Liu, Wenfei Yin, Jian Liu | Published: 2025-03-02 | Updated: 2025-03-21 2025.03.02 2025.04.03 文献データベース
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 2025.03.01 文献データベース
Cyber Defense Reinvented: Large Language Models as Threat Intelligence Copilots Authors: Xiaoqun Liu, Jiacheng Liang, Qiben Yan, Jiyong Jang, Sicheng Mao, Muchao Ye, Jinyuan Jia, Zhaohan Xi | Published: 2025-02-28 | Updated: 2025-04-16 2025.02.28 文献データベース
Models That Are Interpretable But Not Transparent Authors: Chudi Zhong, Panyu Chen, Cynthia Rudin | Published: 2025-02-26 2025.02.26 2025.04.03 文献データベース
Evaluating Membership Inference Attacks in heterogeneous-data setups Authors: Bram van Dartel, Marc Damie, Florian Hahn | Published: 2025-02-26 | Updated: 2025-04-28 2025.02.26 文献データベース
Can Indirect Prompt Injection Attacks Be Detected and Removed? Authors: Yulin Chen, Haoran Li, Yuan Sui, Yufei He, Yue Liu, Yangqiu Song, Bryan Hooi | Published: 2025-02-23 2025.02.23 2025.04.03 文献データベース
Nuclear Deployed: Analyzing Catastrophic Risks in Decision-making of Autonomous LLM Agents Authors: Rongwu Xu, Xiaojian Li, Shuo Chen, Wei Xu | Published: 2025-02-17 | Updated: 2025-03-23 2025.02.17 2025.04.03 文献データベース
RLSA-PFL: Robust Lightweight Secure Aggregation with Model Inconsistency Detection in Privacy-Preserving Federated Learning Authors: Nazatul H. Sultan, Yan Bo, Yansong Gao, Seyit Camtepe, Arash Mahboubi, Hang Thanh Bui, Aufeef Chauhan, Hamed Aboutorab, Michael Bewong, Dineshkumar Singh, Praveen Gauravaram, Rafiqul Islam, Sharif Abuadbba | Published: 2025-02-13 | Updated: 2025-04-16 2025.02.13 文献データベース
RESIST: Resilient Decentralized Learning Using Consensus Gradient Descent Authors: Cheng Fang, Rishabh Dixit, Waheed U. Bajwa, Mert Gurbuzbalaban | Published: 2025-02-11 2025.02.11 2025.04.03 文献データベース
Scalable and Ethical Insider Threat Detection through Data Synthesis and Analysis by LLMs Authors: Haywood Gelman, John D. Hastings | Published: 2025-02-10 | Updated: 2025-04-07 2025.02.10 文献データベース