文献データベース

Prada: Black-Box LLM Adaptation with Private Data on Resource-Constrained Devices

Authors: Ziyao Wang, Yexiao He, Zheyu Shen, Yu Li, Guoheng Sun, Myungjin Lee, Ang Li | Published: 2025-03-19
プライバシー保護手法
プロンプトリーキング
深層学習

Temporal Context Awareness: A Defense Framework Against Multi-turn Manipulation Attacks on Large Language Models

Authors: Prashant Kulkarni, Assaf Namer | Published: 2025-03-18
プロンプトインジェクション
プロンプトリーキング
攻撃手法

Personalized Attacks of Social Engineering in Multi-turn Conversations — LLM Agents for Simulation and Detection

Authors: Tharindu Kumarage, Cameron Johnson, Jadie Adams, Lin Ai, Matthias Kirchner, Anthony Hoogs, Joshua Garland, Julia Hirschberg, Arslan Basharat, Huan Liu | Published: 2025-03-18
アライメント
ソーシャルエンジニアリング攻撃
攻撃手法

Anomaly-Flow: A Multi-domain Federated Generative Adversarial Network for Distributed Denial-of-Service Detection

Authors: Leonardo Henrique de Melo, Gustavo de Carvalho Bertoli, Michele Nogueira, Aldri Luiz dos Santos, Lourenço Alves Pereira Junior | Published: 2025-03-18
サイバー脅威
データ生成手法
攻撃手法

Zero-Knowledge Federated Learning: A New Trustworthy and Privacy-Preserving Distributed Learning Paradigm

Authors: Yuxin Jin, Taotao Wang, Qing Yang, Long Shi, Shengli Zhang | Published: 2025-03-18 | Updated: 2025-03-24
クライアント貢献評価
プライバシー保護機械学習
悪意のあるクライアント

Optimizing ML Training with Metagradient Descent

Authors: Logan Engstrom, Andrew Ilyas, Benjamin Chen, Axel Feldmann, William Moses, Aleksander Madry | Published: 2025-03-17
ポイズニング
最適化アルゴリズムの選択と評価
深層学習

SOSecure: Safer Code Generation with RAG and StackOverflow Discussions

Authors: Manisha Mukherjee, Vincent J. Hellendoorn | Published: 2025-03-17
RAG
RAGへのポイズニング攻撃
脆弱性検出

Zero-Knowledge Proof-Based Consensus for Blockchain-Secured Federated Learning

Authors: Tianxing Fu, Jia Hu, Geyong Min, Zi Wang | Published: 2025-03-17
プライバシー保護手法
効率的証明システム
深層学習

VeriLeaky: Navigating IP Protection vs Utility in Fine-Tuning for LLM-Driven Verilog Coding

Authors: Zeng Wang, Minghao Shao, Mohammed Nabeel, Prithwish Basu Roy, Likhitha Mankali, Jitendra Bhandari, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17
データ保護手法
プライバシー保護手法
プロンプトリーキング

VeriContaminated: Assessing LLM-Driven Verilog Coding for Data Contamination

Authors: Zeng Wang, Minghao Shao, Jitendra Bhandari, Likhitha Mankali, Ramesh Karri, Ozgur Sinanoglu, Muhammad Shafique, Johann Knechtel | Published: 2025-03-17
FPGA
プログラム解釈グラフ
プロンプトリーキング