A Survey on Responsible LLMs: Inherent Risk, Malicious Use, and Mitigation Strategy Authors: Huandong Wang, Wenjie Fu, Yingzhou Tang, Zhilong Chen, Yuxi Huang, Jinghua Piao, Chen Gao, Fengli Xu, Tao Jiang, Yong Li | Published: 2025-01-16 2025.01.16 2025.04.03 文献データベース
Neural Honeytrace: A Robust Plug-and-Play Watermarking Framework against Model Extraction Attacks Authors: Yixiao Xu, Binxing Fang, Rui Wang, Yinghai Zhou, Shouling Ji, Yuan Liu, Mohan Li, Zhihong Tian | Published: 2025-01-16 | Updated: 2025-01-17 2025.01.16 2025.04.03 文献データベース
Trusted Machine Learning Models Unlock Private Inference for Problems Currently Infeasible with Cryptography Authors: Ilia Shumailov, Daniel Ramage, Sarah Meiklejohn, Peter Kairouz, Florian Hartmann, Borja Balle, Eugene Bagdasarian | Published: 2025-01-15 2025.01.15 2025.04.03 文献データベース
Multilingual Email Phishing Attacks Detection using OSINT and Machine Learning Authors: Panharith An, Rana Shafi, Tionge Mughogho, Onyango Allan Onyango | Published: 2025-01-15 2025.01.15 2025.04.03 文献データベース
Tag&Tab: Pretraining Data Detection in Large Language Models Using Keyword-Based Membership Inference Attack Authors: Sagiv Antebi, Edan Habler, Asaf Shabtai, Yuval Elovici | Published: 2025-01-14 2025.01.14 2025.04.03 文献データベース
Unveiling Provider Bias in Large Language Models for Code Generation Authors: Xiaoyu Zhang, Juan Zhai, Shiqing Ma, Qingshuang Bao, Weipeng Jiang, Chao Shen, Yang Liu | Published: 2025-01-14 2025.01.14 2025.04.03 文献データベース
Adaptive Cybersecurity: Dynamically Retrainable Firewalls for Real-Time Network Protection Authors: Sina Ahmadi | Published: 2025-01-14 2025.01.14 2025.04.03 文献データベース
A Review on the Security Vulnerabilities of the IoMT against Malware Attacks and DDoS Authors: Lily Dzamesi, Nelly Elsayed | Published: 2025-01-13 2025.01.13 2025.04.03 文献データベース
Exploring and Mitigating Adversarial Manipulation of Voting-Based Leaderboards Authors: Yangsibo Huang, Milad Nasr, Anastasios Angelopoulos, Nicholas Carlini, Wei-Lin Chiang, Christopher A. Choquette-Choo, Daphne Ippolito, Matthew Jagielski, Katherine Lee, Ken Ziyu Liu, Ion Stoica, Florian Tramer, Chiyuan Zhang | Published: 2025-01-13 2025.01.13 2025.04.03 文献データベース
A Novel Approach to Network Traffic Analysis: the HERA tool Authors: Daniela Pinto, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-01-13 2025.01.13 2025.04.03 文献データベース