zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16 2025.04.16 文献データベース
Secure Transfer Learning: Training Clean Models Against Backdoor in (Both) Pre-trained Encoders and Downstream Datasets Authors: Yechao Zhang, Yuxuan Zhou, Tianyu Li, Minghui Li, Shengshan Hu, Wei Luo, Leo Yu Zhang | Published: 2025-04-16 2025.04.16 文献データベース
The Evolution of Zero Trust Architecture (ZTA) from Concept to Implementation Authors: Md Nasiruzzaman, Maaruf Ali, Iftekhar Salam, Mahdi H. Miraz | Published: 2025-04-16 2025.04.16 文献データベース
Support is All You Need for Certified VAE Training Authors: Changming Xu, Debangshu Banerjee, Deepak Vasisht, Gagandeep Singh | Published: 2025-04-16 2025.04.16 文献データベース
The Digital Cybersecurity Expert: How Far Have We Come? Authors: Dawei Wang, Geng Zhou, Xianglong Li, Yu Bai, Li Chen, Ting Qin, Jian Sun, Dan Li | Published: 2025-04-16 2025.04.16 文献データベース
Progent: Programmable Privilege Control for LLM Agents Authors: Tianneng Shi, Jingxuan He, Zhun Wang, Linyu Wu, Hongwei Li, Wenbo Guo, Dawn Song | Published: 2025-04-16 2025.04.16 文献データベース
The Obvious Invisible Threat: LLM-Powered GUI Agents’ Vulnerability to Fine-Print Injections Authors: Chaoran Chen, Zhiping Zhang, Bingcan Guo, Shang Ma, Ibrahim Khalilov, Simret A Gebreegziabher, Yanfang Ye, Ziang Xiao, Yaxing Yao, Tianshi Li, Toby Jia-Jun Li | Published: 2025-04-15 2025.04.15 文献データベース
Exploring Backdoor Attack and Defense for LLM-empowered Recommendations Authors: Liangbo Ning, Wenqi Fan, Qing Li | Published: 2025-04-15 2025.04.15 文献データベース
Bypassing Prompt Injection and Jailbreak Detection in LLM Guardrails Authors: William Hackett, Lewis Birch, Stefan Trawicki, Neeraj Suri, Peter Garraghan | Published: 2025-04-15 2025.04.15 文献データベース