Automating the Detection of Code Vulnerabilities by Analyzing GitHub Issues Authors: Daniele Cipollone, Changjie Wang, Mariano Scazzariello, Simone Ferlin, Maliheh Izadi, Dejan Kostic, Marco Chiesa | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
EVA-S2PLoR: A Secure Element-wise Multiplication Meets Logistic Regression on Heterogeneous Database Authors: Tianle Tao, Shizhao Peng, Tianyu Mei, Shoumo Li, Haogang Zhu | Published: 2025-01-09 | Updated: 2025-01-13 2025.01.09 2025.04.03 文献データベース
Bringing Order Amidst Chaos: On the Role of Artificial Intelligence in Secure Software Engineering Authors: Matteo Esposito | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
TAPFed: Threshold Secure Aggregation for Privacy-Preserving Federated Learning Authors: Runhua Xu, Bo Li, Chao Li, James B. D. Joshi, Shuai Ma, Jianxin Li | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
SpaLLM-Guard: Pairing SMS Spam Detection Using Open-source and Commercial LLMs Authors: Muhammad Salman, Muhammad Ikram, Nardine Basta, Mohamed Ali Kaafar | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
Jailbreaking Multimodal Large Language Models via Shuffle Inconsistency Authors: Shiji Zhao, Ranjie Duan, Fengxiang Wang, Chi Chen, Caixin Kang, Jialing Tao, YueFeng Chen, Hui Xue, Xingxing Wei | Published: 2025-01-09 2025.01.09 2025.04.03 文献データベース
Exploring Large Language Models for Semantic Analysis and Categorization of Android Malware Authors: Brandon J Walton, Mst Eshita Khatun, James M Ghawaly, Aisha Ali-Gombe | Published: 2025-01-08 2025.01.08 2025.04.03 文献データベース
Fast, Fine-Grained Equivalence Checking for Neural Decompilers Authors: Luke Dramko, Claire Le Goues, Edward J. Schwartz | Published: 2025-01-08 2025.01.08 2025.04.03 文献データベース
Understanding, Implementing, and Supporting Security Assurance Cases in Safety-Critical Domains Authors: Mazen Mohamad | Published: 2025-01-08 2025.01.08 2025.04.03 文献データベース