文献データベース

More Haste, Less Speed: Weaker Single-Layer Watermark Improves Distortion-Free Watermark Ensembles

Authors: Ruibo Chen, Yihan Wu, Xuehao Cui, Jingqi Zhang, Heng Huang | Published: 2026-02-12
著者帰属手法
透かしの耐久性
透かし攻撃

LoRA-based Parameter-Efficient LLMs for Continuous Learning in Edge-based Malware Detection

Authors: Christian Rondanini, Barbara Carminati, Elena Ferrari, Niccolò Lardo, Ashish Kundu | Published: 2026-02-12
エッジコンピューティング
実験的検証
連合学習

Stop Tracking Me! Proactive Defense Against Attribute Inference Attack in LLMs

Authors: Dong Yan, Jian Liang, Ran He, Tieniu Tan | Published: 2026-02-12
LLMの安全機構の解除
プライバシー保証
説明手法

Differentially Private and Communication Efficient Large Language Model Split Inference via Stochastic Quantization and Soft Prompt

Authors: Yujie Gu, Richeng Jin, Xiaoyu Ji, Yier Jin, Wenyuan Xu | Published: 2026-02-12
プライバシー保証
プロンプトインジェクション
プロンプトリーキング

Jailbreaking Leaves a Trace: Understanding and Detecting Jailbreak Attacks from Internal Representations of Large Language Models

Authors: Sri Durga Sai Sowmya Kadali, Evangelos E. Papalexakis | Published: 2026-02-12
プロンプトインジェクション
実験的検証
評価手法

Cachemir: Fully Homomorphic Encrypted Inference of Generative Large Language Model with KV Cache

Authors: Ye Yu, Yifan Zhou, Yi Chen, Pedro Soto, Wenjie Xiong, Meng Li | Published: 2026-02-12
アルゴリズム
モデルDoS
差分プライバシー

Towards Explainable Federated Learning: Understanding the Impact of Differential Privacy

Authors: Júlio Oliveira, Rodrigo Ferreira, André Riker, Glaucio H. S. Carvalho, Eirini Eleni Tsilopoulou | Published: 2026-02-10
プライバシー保証
差分プライバシー
連合学習

CAPID: Context-Aware PII Detection for Question-Answering Systems

Authors: Mariia Ponomarenko, Sepideh Abedini, Masoumeh Shafieinejad, D. B. Emerson, Shubhankar Mohapatra, Xi He | Published: 2026-02-10
インダイレクトプロンプトインジェクション
データ流出に関する分析手法
プライバシー保証

Focus Session: LLM4PQC — An Agentic Framework for Accurate and Efficient Synthesis of PQC Cores

Authors: Buddhi Perera, Zeng Wang, Weihua Xiao, Mohammed Nabeel, Ozgur Sinanoglu, Johann Knechtel, Ramesh Karri | Published: 2026-02-10
LLM性能評価
ハードウェアアクセラレータ
プロンプトリーキング

QRS: A Rule-Synthesizing Neuro-Symbolic Triad for Autonomous Vulnerability Discovery

Authors: George Tsigkourakos, Constantinos Patsakis | Published: 2026-02-10
データ流出に関する分析手法
脆弱性分析
脆弱性検出手法