文献データベース

SecFSM: Knowledge Graph-Guided Verilog Code Generation for Secure Finite State Machines in Systems-on-Chip

Authors: Ziteng Hu, Yingjie Xia, Xiyuan Chen, Li Kuang | Published: 2025-08-18
ハードウェアセキュリティ
知識グラフ推論
脆弱性管理

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
アルゴリズム設計
プライバシー設計原則
透かし設計

Consiglieres in the Shadow: Understanding the Use of Uncensored Large Language Models in Cybercrimes

Authors: Zilong Lin, Zichuan Li, Xiaojing Liao, XiaoFeng Wang | Published: 2025-08-18
LLMの安全機構の解除
データ生成手法
出力の有害度の算出

UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks

Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18
UAV個体識別
パフォーマンス評価
透かし評価

Systematic Analysis of MCP Security

Authors: Yongjian Guo, Puzhuo Liu, Wanlun Ma, Zehang Deng, Xiaogang Zhu, Peng Di, Xi Xiao, Sheng Wen | Published: 2025-08-18
プロンプトインジェクション
攻撃チェーン分析
脆弱性評価手法

MCPSecBench: A Systematic Security Benchmark and Playground for Testing Model Context Protocols

Authors: Yixuan Yang, Daoyuan Wu, Yufan Chen | Published: 2025-08-17 | Updated: 2025-10-09
プロンプトリーキング
大規模言語モデル
防御メカニズム

CryptPEFT: Efficient and Private Neural Network Inference via Parameter-Efficient Fine-Tuning

Authors: Saisai Xia, Wenhao Wang, Zihao Wang, Yuhui Zhang, Yier Jin, Dan Meng, Rui Hou | Published: 2025-08-17 | Updated: 2025-11-06
バックドアモデルの検知
プライバシー保護
深層学習手法

SoK: Data Minimization in Machine Learning

Authors: Robin Staab, Nikola Jovanović, Kimberly Mai, Prakhar Ganesh, Martin Vechev, Ferdinando Fioretto, Matthew Jagielski | Published: 2025-08-14
RAG
プライバシー評価
差分プライバシー

Advancing Autonomous Incident Response: Leveraging LLMs and Cyber Threat Intelligence

Authors: Amine Tellache, Abdelaziz Amara Korba, Amdjed Mokhtari, Horea Moldovan, Yacine Ghamri-Doudane | Published: 2025-08-14
LLM活用
RAG
フレームワーク

A Transformer-Based Approach for DDoS Attack Detection in IoT Networks

Authors: Sandipan Dey, Payal Santosh Kate, Vatsala Upadhyay, Abhishek Vaish | Published: 2025-08-14
データ収集
性能評価
研究方法論