On the Price of Differential Privacy for Hierarchical Clustering Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22 2025.04.22 文献データベース
GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21 2025.04.21 文献データベース
Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21 2025.04.21 文献データベース
aiXamine: LLM Safety and Security Simplified Authors: Fatih Deniz, Dorde Popovic, Yazan Boshmaf, Euisuh Jeong, Minhaj Ahmad, Sanjay Chawla, Issa Khalil | Published: 2025-04-21 2025.04.21 文献データベース
How Effective Can Dropout Be in Multiple Instance Learning ? Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21 2025.04.21 文献データベース
BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21 2025.04.18 文献データベース
GraphAttack: Exploiting Representational Blindspots in LLM Safety Mechanisms Authors: Sinan He, An Wang | Published: 2025-04-17 2025.04.17 文献データベース
Malicious Code Detection in Smart Contracts via Opcode Vectorization Authors: Huanhuan Zou, Zongwei Li, Xiaoqi Li | Published: 2025-04-17 2025.04.17 文献データベース
Watermarking Needs Input Repetition Masking Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16 2025.04.16 文献データベース
zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 2025.04.16 文献データベース