文献データベース

Security and Detectability Analysis of Unicode Text Watermarking Methods Against Large Language Models

Authors: Malte Hellmeier | Published: 2025-12-15
セキュリティ検証手法
生成AI向け電子透かし
透かし評価

Cisco Integrated AI Security and Safety Framework Report

Authors: Amy Chang, Tiffany Saade, Sanket Mendapara, Adam Swanda, Ankit Garg | Published: 2025-12-15
インダイレクトプロンプトインジェクション
サイバーセキュリティの脅威
セキュリティ考慮

CTIGuardian: A Few-Shot Framework for Mitigating Privacy Leakage in Fine-Tuned LLMs

Authors: Shashie Dilhara Batan Arachchige, Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Dinusha Vatsalan, Dali Kaafar | Published: 2025-12-15
トレードオフ分析
プライバシー保護手法
プロンプトリーキング

Virtual camera detection: Catching video injection attacks in remote biometric systems

Authors: Daniyar Kurmankhojayev, Andrei Shadrikov, Dmitrii Gordin, Mikhail Shkorin, Danijar Gabdullin, Aigerim Kambetbayeva, Kanat Kuatov | Published: 2025-12-11
VCD技術
ユーザー識別システム
悪意のあるクライアント

TriDF: Evaluating Perception, Detection, and Hallucination for Interpretable DeepFake Detection

Authors: Jian-Yu Jiang-Lin, Kang-Yang Huang, Ling Zou, Ling Lo, Sheng-Ping Yang, Yu-Wen Tseng, Kun-Hsiang Lin, Chia-Ling Chen, Yu-Ting Ta, Yan-Tsung Wang, Po-Ching Chen, Hongxia Xie, Hong-Han Shuai, Wen-Huang Cheng | Published: 2025-12-11
ハルシネーションの検知
モデルDoS
評価手法

LLM-Assisted AHP for Explainable Cyber Range Evaluation

Authors: Vyron Kampourakis, Georgios Kavallieratos, Georgios Spathoulas, Vasileios Gkioulos, Sokratis Katsikas | Published: 2025-12-11
XAI(説明可能なAI)
信頼性評価
評価手法

From Lab to Reality: A Practical Evaluation of Deep Learning Models and LLMs for Vulnerability Detection

Authors: Chaomeng Lu, Bert Lagaisse | Published: 2025-12-11
モデルの頑健性保証
出力の有害度の算出
評価手法

When Reject Turns into Accept: Quantifying the Vulnerability of LLM-Based Scientific Reviewers to Indirect Prompt Injection

Authors: Devanshu Sahoo, Manish Prasad, Vasudev Majhi, Jahnvi Singh, Vinay Chamola, Yash Sinha, Murari Mandal, Dhruv Kumar | Published: 2025-12-11
インダイレクトプロンプトインジェクション
敵対的攻撃分析
評価手法

Differential Privacy for Secure Machine Learning in Healthcare IoT-Cloud Systems

Authors: N Mangala, Murtaza Rangwala, S Aishwarya, B Eswara Reddy, Rajkumar Buyya, KR Venugopal, SS Iyengar, LM Patnaik | Published: 2025-12-11
バックドア攻撃用の毒データの検知
プライバシー保護技術
差分プライバシー

D2M: A Decentralized, Privacy-Preserving, Incentive-Compatible Data Marketplace for Collaborative Learning

Authors: Yash Srivastava, Shalin Jain, Sneha Awathare, Nitin Awathare | Published: 2025-12-11
ブロックチェーン技術
経済的実現可能性
連合学習システム