Large Language Models are Unreliable for Cyber Threat Intelligence Authors: Emanuele Mezzi, Fabio Massacci, Katja Tuma | Published: 2025-03-29 | Updated: 2025-07-16 2025.03.29 文献データベース
Instance-Level Data-Use Auditing of Visual ML Models Authors: Zonghao Huang, Neil Zhenqiang Gong, Michael K. Reiter | Published: 2025-03-28 | Updated: 2025-09-16 2025.03.28 文献データベース
Intelligent IoT Attack Detection Design via ODLLM with Feature Ranking-based Knowledge Base Authors: Satvik Verma, Qun Wang, E. Wes Bethel | Published: 2025-03-27 2025.03.27 2025.04.03 文献データベース
Prompt, Divide, and Conquer: Bypassing Large Language Model Safety Filters via Segmented and Distributed Prompt Processing Authors: Johan Wahréus, Ahmed Hussain, Panos Papadimitratos | Published: 2025-03-27 2025.03.27 2025.04.03 文献データベース
Bayesian Pseudo Posterior Mechanism for Differentially Private Machine Learning Authors: Robert Chew, Matthew R. Williams, Elan A. Segarra, Alexander J. Preiss, Amanda Konet, Terrance D. Savitsky | Published: 2025-03-27 2025.03.27 2025.04.03 文献データベース
Tricking Retrievers with Influential Tokens: An Efficient Black-Box Corpus Poisoning Attack Authors: Cheng Wang, Yiwei Wang, Yujun Cai, Bryan Hooi | Published: 2025-03-27 2025.03.27 2025.04.03 文献データベース