文献データベース

BounTCHA: A CAPTCHA Utilizing Boundary Identification in Guided Generative AI-extended Videos

Authors: Lehao Lin, Ke Wang, Maha Abdallah, Wei Cai | Published: 2025-01-30 | Updated: 2025-04-01
CAPTCHA
動画信頼性確保
敵対的サンプルの脆弱性

Large Language Models for Cryptocurrency Transaction Analysis: A Bitcoin Case Study

Authors: Yuchen Lei, Yuexin Xiang, Qin Wang, Rafael Dowsley, Tsz Hon Yuen, Kim-Kwang Raymond Choo, Jiangshan Yu | Published: 2025-01-30 | Updated: 2025-09-04
インダイレクトプロンプトインジェクション
グラフ分析
不正取引

Smoothed Embeddings for Robust Language Models

Authors: Ryo Hase, Md Rafi Ur Rashid, Ashley Lewis, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2025-01-27
プロンプトインジェクション
メンバーシップ推論
敵対的訓練

Towards Robust Stability Prediction in Smart Grids: GAN-based Approach under Data Constraints and Adversarial Challenges

Authors: Emad Efatinasab, Alessandro Brighente, Denis Donadel, Mauro Conti, Mirco Rampazzo | Published: 2025-01-27 | Updated: 2025-06-24
エネルギー管理
モデル抽出攻撃
敵対的学習

TombRaider: Entering the Vault of History to Jailbreak Large Language Models

Authors: Junchen Ding, Jiahao Zhang, Yi Liu, Ziqi Ding, Gelei Deng, Yuekang Li | Published: 2025-01-27 | Updated: 2025-08-25
プロンプトインジェクション
プロンプトリーキング
脱獄手法

Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning

Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26
ネットワーク脅威検出
ユーザー活動解析
学習の改善

I Know What You Did Last Summer: Identifying VR User Activity Through VR Network Traffic

Authors: Sheikh Samit Muhaimin, Spyridon Mastorakis | Published: 2025-01-25 | Updated: 2025-05-05
アプリ分類手法
ユーザー行動の変化
機械学習技術

Optimizing Privacy-Utility Trade-off in Decentralized Learning with Generalized Correlated Noise

Authors: Angelo Rodio, Zheng Chen, Erik G. Larsson | Published: 2025-01-24 | Updated: 2025-07-23
RDPの特性
分散学習の効率
差分プライバシー

A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27
プライバシー問題
透かし技術
連合学習

Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks

Authors: Akshayaa Magesh, Venugopal V. Veeravalli | Published: 2025-01-21
収束保証
収束分析
通信効率