Smoothed Embeddings for Robust Language Models Authors: Ryo Hase, Md Rafi Ur Rashid, Ashley Lewis, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2025-01-27 プロンプトインジェクションメンバーシップ推論敵対的訓練 2025.01.27 2025.04.03 文献データベース
Improving Network Threat Detection by Knowledge Graph, Large Language Model, and Imbalanced Learning Authors: Lili Zhang, Quanyan Zhu, Herman Ray, Ying Xie | Published: 2025-01-26 ネットワーク脅威検出ユーザー活動解析学習の改善 2025.01.26 2025.04.03 文献データベース
A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27 プライバシー問題透かし技術連合学習 2025.01.22 2025.04.03 文献データベース
Heterogeneous Multi-Player Multi-Armed Bandits Robust To Adversarial Attacks Authors: Akshayaa Magesh, Venugopal V. Veeravalli | Published: 2025-01-21 収束保証収束分析通信効率 2025.01.21 2025.04.03 文献データベース
Provably effective detection of effective data poisoning attacks Authors: Jonathan Gallagher, Yasaman Esfandiari, Callen MacPhee, Michael Warren | Published: 2025-01-21 バックドア攻撃ポイズニング実験的検証 2025.01.21 2025.04.03 文献データベース
Poison-RAG: Adversarial Data Poisoning Attacks on Retrieval-Augmented Generation in Recommender Systems Authors: Fatemeh Nazary, Yashar Deldjoo, Tommaso di Noia | Published: 2025-01-20 RAGへのポイズニング攻撃タグ選択戦略ポイズニング攻撃 2025.01.20 2025.04.03 文献データベース
Everyone’s Privacy Matters! An Analysis of Privacy Leakage from Real-World Facial Images on Twitter and Associated User Behaviors Authors: Yuqi Niu, Weidong Qiu, Peng Tang, Lifan Wang, Shuo Chen, Shujun Li, Nadin Kokciyan, Ben Niu | Published: 2025-01-20 プライバシー手法画像をAIにより分析し、個人情報を推測する攻撃顔認識技術 2025.01.20 2025.04.03 文献データベース
LegalGuardian: A Privacy-Preserving Framework for Secure Integration of Large Language Models in Legal Practice Authors: M. Mikail Demir, Hakan T. Otal, M. Abdullah Canbaz | Published: 2025-01-19 プライバシー保護学習の改善安全性アライメント 2025.01.19 2025.04.03 文献データベース
Latent-space adversarial training with post-aware calibration for defending large language models against jailbreak attacks Authors: Xin Yi, Yue Li, Linlin Wang, Xiaoling Wang, Liang He | Published: 2025-01-18 プロンプトインジェクション敵対的訓練過剰拒否緩和 2025.01.18 2025.04.03 文献データベース
AI/ML Based Detection and Categorization of Covert Communication in IPv6 Network Authors: Mohammad Wali Ur Rahman, Yu-Zheng Lin, Carter Weeks, David Ruddell, Jeff Gabriellini, Bill Hayes, Salim Hariri, Edward V. Ziegler Jr | Published: 2025-01-18 IPv6セキュリティネットワーク脅威検出通信解析 2025.01.18 2025.04.03 文献データベース