文献データベース

ALMGuard: Safety Shortcuts and Where to Find Them as Guardrails for Audio-Language Models

Authors: Weifei Jin, Yuxin Cao, Junjie Su, Minhui Xue, Jie Hao, Ke Xu, Jin Song Dong, Derui Wang | Published: 2025-10-30
プロンプトインジェクション
一般化の影響
倫理基準遵守

Model Inversion Attacks Meet Cryptographic Fuzzy Extractors

Authors: Mallika Prabhakar, Louise Xu, Prateek Saxena | Published: 2025-10-29
メンバーシップ推論
モデルインバージョン
防御手法

Spectral Perturbation Bounds for Low-Rank Approximation with Applications to Privacy

Authors: Phuc Tran, Nisheeth K. Vishnoi, Van H. Vu | Published: 2025-10-29
プライバシー保護アルゴリズム
計算効率
関数境界ペア形成

Monitoring the calibration of probability forecasts with an application to concept drift detection involving image classification

Authors: Christopher T. Franck, Anne R. Driscoll, Zoe Szajnfarber, William H. Woodall | Published: 2025-10-29
キャリブレーション
制御限界
画像分類

NetEcho: From Real-World Streaming Side-Channels to Full LLM Conversation Recovery

Authors: Zheng Zhang, Guanlong Wu, Sen Deng, Shuai Wang, Yinqian Zhang | Published: 2025-10-29
ネットワークトラフィック分析
モデル抽出攻撃
防御手法

An In-Depth Analysis of Cyber Attacks in Secured Platforms

Authors: Parick Ozoh, John K Omoniyi, Bukola Ibitoye | Published: 2025-10-29
サイバー脅威
プライバシー漏洩
防御手法

AgentCyTE: Leveraging Agentic AI to Generate Cybersecurity Training & Experimentation Scenarios

Authors: Ana M. Rodriguez, Jaime Acosta, Anantaa Kotal, Aritran Piplai | Published: 2025-10-29
サービスの構成
ネットワークノードの構成
パフォーマンス評価

A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies

Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28
パフォーマンス評価
モデル評価手法
量子情報と量子計算

Design and Optimization of Cloud Native Homomorphic Encryption Workflows for Privacy-Preserving ML Inference

Authors: Tejaswini Bollikonda | Published: 2025-10-28
プライバシー保護
暗号化技術
暗号化環境でのデータ処理

Uncovering Gaps Between RFC Updates and TCP/IP Implementations: LLM-Facilitated Differential Checks on Intermediate Representations

Authors: Yifan Wu, Xuewei Feng, Yuxiang Yang, Ke Xu | Published: 2025-10-28
RAG
TCP接続特性
脆弱性分析