文献データベース

rSDNet: Unified Robust Neural Learning against Label Noise and Adversarial Attacks

Authors: Suryasis Jana, Abhik Ghosh | Published: 2026-03-18
ポイズニング
ロバスト性評価
評価手法

DDH-based schemes for multi-party Function Secret Sharing

Authors: Marc Damie, Florian Hahn, Andreas Peter, Jan Ramon | Published: 2026-03-18
DPPセット生成
データプライバシー評価
評価手法

Caging the Agents: A Zero Trust Security Architecture for Autonomous AI in Healthcare

Authors: Saikat Maiti | Published: 2026-03-18
インダイレクトプロンプトインジェクション
データ保護手法
脆弱性研究

Federated Computing as Code (FCaC): Sovereignty-aware Systems by Design

Authors: Enzo Fenoglio, Philip Treleaven | Published: 2026-03-18
データ整合性制約
評価手法
連合学習

Network- and Device-Level Cyber Deception for Contested Environments Using RL and LLMs

Authors: Abhijeet Sahu, Shuva Paul, Rochard Macwan | Published: 2026-03-18
LLM性能評価
RAGへのポイズニング攻撃
評価手法

Deanonymizing Bitcoin Transactions via Network Traffic Analysis with Semi-supervised Learning

Authors: Shihan Zhang, Bing Han, Chuanyong Tian, Ruisheng Shi, Lina Lan, Qin Wang | Published: 2026-03-18
プライバシー漏洩
機械学習の応用
評価手法

SAMSEM — A Generic and Scalable Approach for IC Metal Line Segmentation

Authors: Christian Gehrmann, Jonas Ricker, Simon Damm, Deruo Cheng, Julian Speith, Yiqiong Shi, Asja Fischer, Christof Paar | Published: 2026-03-17
セグメンテーション手法
損失関数
設計検証

Rotated Robustness: A Training-Free Defense against Bit-Flip Attacks on Large Language Models

Authors: Deng Liu, Song Chen | Published: 2026-03-17
敵対的学習
脆弱性管理
評価手法

Resource Consumption Threats in Large Language Models

Authors: Yuanhe Zhang, Xinyue Wang, Zhican Chen, Weiliu Wang, Zilu Zhang, Zhengshuo Gong, Zhenhong Zhou, Li Sun, Yang Liu, Sen Su | Published: 2026-03-17
モデルDoS
リソース消費分析
脅威モデリング

From Storage to Steering: Memory Control Flow Attacks on LLM Agents

Authors: Zhenlin Xu, Xiaogang Zhu, Yu Yao, Minhui Xue, Yiliao Song | Published: 2026-03-16