文献データベース

Private Aggregation for Byzantine-Resilient Heterogeneous Federated Learning

Authors: Maximilian Egger, Rawad Bitar | Published: 2025-06-11
プライバシー保護フレームワーク
ロバスト性評価
連合学習

Evasion Attacks Against Bayesian Predictive Models

Authors: Pablo G. Arce, Roi Naveiro, David Ríos Insua | Published: 2025-06-11
バックドア攻撃
ベイジアン敵対的学習
敵対的摂動手法

Learning Obfuscations Of LLM Embedding Sequences: Stained Glass Transform

Authors: Jay Roberts, Kyle Mylonakis, Sidhartha Roy, Kaan Kale | Published: 2025-06-11
プライバシー保護技術
差分プライバシー
情報理論的関係

LLMs Cannot Reliably Judge (Yet?): A Comprehensive Assessment on the Robustness of LLM-as-a-Judge

Authors: Songze Li, Chuokun Xu, Jiaying Wang, Xueluan Gong, Chen Chen, Jirui Zhang, Jun Wang, Kwok-Yan Lam, Shouling Ji | Published: 2025-06-11
LLMの安全機構の解除
プロンプトインジェクション
敵対的攻撃

Adversarial Surrogate Risk Bounds for Binary Classification

Authors: Natalie S. Frank | Published: 2025-06-11
モデルの頑健性保証
収束解析
関数境界ペア形成

Design Patterns for Securing LLM Agents against Prompt Injections

Authors: Luca Beurer-Kellner, Beat Buesser Ana-Maria Creţu, Edoardo Debenedetti, Daniel Dobos, Daniel Fabian, Marc Fischer, David Froelicher, Kathrin Grosse, Daniel Naeff, Ezinwanne Ozoani, Andrew Paverd, Florian Tramèr, Václav Volhejn | Published: 2025-06-10 | Updated: 2025-06-11
インダイレクトプロンプトインジェクション
プロンプトインジェクション
防御手法

Your Agent Can Defend Itself against Backdoor Attacks

Authors: Li Changjiang, Liang Jiacheng, Cao Bochuan, Chen Jinghui, Wang Ting | Published: 2025-06-10 | Updated: 2025-06-11
RAGへのポイズニング攻撃
バックドア攻撃対策
防御手法

Understanding the Error Sensitivity of Privacy-Aware Computing

Authors: Matías Mazzanti, Esteban Mocskos, Augusto Vega, Pradip Bose | Published: 2025-06-09
エラー訂正コード
プライバシー保護メカニズム
暗号化技術

TokenBreak: Bypassing Text Classification Models Through Token Manipulation

Authors: Kasimir Schulz, Kenneth Yeung, Kieran Evans | Published: 2025-06-09
敵対的攻撃手法
防御手法

Secure Distributed Learning for CAVs: Defending Against Gradient Leakage with Leveled Homomorphic Encryption

Authors: Muhammad Ali Najjar, Ren-Yi Huang, Dumindu Samaraweera, Prashant Shekhar | Published: 2025-06-09
プライバシー保護メカニズム
暗号化技術
連合学習