文献データベース

EditMF: Drawing an Invisible Fingerprint for Your Large Language Models

Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12
大規模言語モデル
著者帰属手法
透かし設計

Generative AI for Critical Infrastructure in Smart Grids: A Unified Framework for Synthetic Data Generation and Anomaly Detection

Authors: Aydin Zaboli, Junho Hong | Published: 2025-08-12
カテゴリ変数の摂動手法
フレームワーク
性能評価手法

Robust Anomaly Detection in O-RAN: Leveraging LLMs against Data Manipulation Attacks

Authors: Thusitha Dayaratne, Ngoc Duy Pham, Viet Vo, Shangqi Lai, Sharif Abuadbba, Hajime Suzuki, Xingliang Yuan, Carsten Rudolph | Published: 2025-08-11
フレームワーク
プロンプトインジェクション
性能評価手法

Chimera: Harnessing Multi-Agent LLMs for Automatic Insider Threat Simulation

Authors: Jiongchi Yu, Xiaofei Xie, Qiang Hu, Yuhan Ma, Ziming Zhao | Published: 2025-08-11
インダイレクトプロンプトインジェクション
データ収集
ユーザー行動分析

Uncertainty-Driven Reliability: Selective Prediction and Trustworthy Deployment in Modern Machine Learning

Authors: Stephan Rabanser | Published: 2025-08-11
データキュレーション
差分プライバシー
選択的予測におけるリスクとカバレッジのトレードオフ

ScamDetect: Towards a Robust, Agnostic Framework to Uncover Threats in Smart Contracts

Authors: Pasquale De Rosa, Pascal Felber, Valerio Schiavoni | Published: 2025-08-09 | Updated: 2025-08-12
フレームワーク
プロアクティブ防御

Non-omniscient backdoor injection with a single poison sample: Proving the one-poison hypothesis for linear regression and linear classification

Authors: Thorsten Peinemann, Paula Arnold, Sebastian Berndt, Thomas Eisenbarth, Esfandiar Mohammadi | Published: 2025-08-07
バックドア攻撃
バックドア攻撃手法
ポイズニング

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07
IoTネットワーク攻撃
性能評価手法
透かし設計

PRvL: Quantifying the Capabilities and Risks of Large Language Models for PII Redaction

Authors: Leon Garza, Anantaa Kotal, Aritran Piplai, Lavanya Elluri, Prajit Das, Aman Chadha | Published: 2025-08-07
RAG
性能評価手法
深層学習

Incident Response Planning Using a Lightweight Large Language Model with Reduced Hallucination

Authors: Kim Hammar, Tansu Alpcan, Emil C. Lupu | Published: 2025-08-07
RAGへのポイズニング攻撃
強化学習
性能評価手法