ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03 2025.03.07 文献データベース
The Beginner’s Textbook for Fully Homomorphic Encryption Authors: Ronny Ko | Published: 2025-03-07 | Updated: 2025-03-14 2025.03.07 2025.04.03 文献データベース
Mark Your LLM: Detecting the Misuse of Open-Source Large Language Models via Watermarking Authors: Yijie Xu, Aiwei Liu, Xuming Hu, Lijie Wen, Hui Xiong | Published: 2025-03-06 | Updated: 2025-03-15 2025.03.06 2025.04.03 文献データベース
Unsupervised anomaly detection on cybersecurity data streams: a case with BETH dataset Authors: Evgeniy Eremin | Published: 2025-03-06 | Updated: 2025-06-16 2025.03.06 文献データベース
Improving LLM Safety Alignment with Dual-Objective Optimization Authors: Xuandong Zhao, Will Cai, Tianneng Shi, David Huang, Licong Lin, Song Mei, Dawn Song | Published: 2025-03-05 | Updated: 2025-06-12 2025.03.05 文献データベース
Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 2025.03.05 2025.04.03 文献データベース
SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07 2025.03.05 文献データベース
PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Hybrid Secret Sharing Authors: Zhichao You, Xuewen Dong, Ke Cheng, Xutong Mu, Jiaxuan Fu, Shiyang Ma, Qiang Qu, Yulong Shen | Published: 2025-03-05 | Updated: 2025-05-14 2025.03.05 文献データベース
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 2025.03.05 文献データベース
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 2025.03.04 2025.04.03 文献データベース