文献データベース

Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges

Authors: Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo | Published: 2025-01-27 | Updated: 2025-06-24
エネルギー管理
モデル抽出攻撃
敵対的学習

TombRaider: Entering the Vault of History to Jailbreak Large Language Models

Authors: Junchen Ding, Jiahao Zhang, Yi Liu, Ziqi Ding, Gelei Deng, Yuekang Li | Published: 2025-01-27 | Updated: 2025-08-25
プロンプトインジェクション
プロンプトリーキング
脱獄手法

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26
ネットワーク脅威検出
ユーザー活動解析
学習の改善

I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic

Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05
アプリ分類手法
ユーザー行動の変化
機械学習技術

Optimizing Privacy-Utility Trade-off in Decentralized Learning with Generalized Correlated Noise

Authors: Angelo Rodio, Zheng Chen, Erik G. Larsson | Published: 2025-01-24 | Updated: 2025-07-23
RDPの特性
分散学習の効率
差分プライバシー

A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27
プライバシー問題
透かし技術
連合学習

Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks

Authors: Akshayaa Magesh, Venugopal V. Veeravalli | Published: 2025-01-21
収束保証
収束分析
通信効率

Provably effective detection of effective data poisoning attacks

Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21
バックドア攻撃
ポイズニング
実験的検証

Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems

Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20
RAGへのポイズニング攻撃
タグ選択戦略
ポイズニング攻撃

Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors

Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu | Published: 2025-01-20
プライバシー手法
画像をAIにより分析し、個人情報を推測する攻撃
顔認識技術