Benchmarking LLMs and LLM-based Agents in Practical Vulnerability Detection for Code Repositories Authors: Alperen Yildiz, Sin G. Teo, Yiling Lou, Yebo Feng, Chong Wang, Dinil M. Divakaran | Published: 2025-03-05 | Updated: 2025-03-18 インダイレクトプロンプトインジェクション深層学習脆弱性検出 2025.03.05 2025.04.03 文献データベース
SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07 プライバシー保護モデル性能評価差分プライバシー 2025.03.05 文献データベース
PriFFT: Privacy-preserving Federated Fine-tuning of Large Language Models via Hybrid Secret Sharing Authors: Zhichao You, Xuewen Dong, Ke Cheng, Xutong Mu, Jiaxuan Fu, Shiyang Ma, Qiang Qu, Yulong Shen | Published: 2025-03-05 | Updated: 2025-05-14 AIによる出力のバイアスの検出プライバシー設計原則暗号技術 2025.03.05 文献データベース
SoK: Knowledge is All You Need: Accelerating Last Mile Delivery for Automated Provenance-based Intrusion Detection with LLMs Authors: Wenrui Cheng, Tiantian Zhu, Chunlin Xiong, Haofei Sun, Zijun Wang, Shunan Jing, Mingqi Lv, Yan Chen | Published: 2025-03-05 | Updated: 2025-04-28 RAG出力の有害度の算出攻撃検出 2025.03.05 文献データベース
Generative Active Adaptation for Drifting and Imbalanced Network Intrusion Detection Authors: Ragini Gupta, Shinan Liu, Ruixiao Zhang, Xinyue Hu, Xiaoyang Wang, Hadjer Benkraouda, Pranav Kommaraju, Nick Feamster, Klara Nahrstedt | Published: 2025-03-04 | Updated: 2025-08-13 アクティブラーニングクラス不均衡データ拡張手法 2025.03.04 文献データベース
Mind the Gap: Detecting Black-box Adversarial Attacks in the Making through Query Update Analysis Authors: Jeonghwan Park, Niall McLaughlin, Ihsen Alouani | Published: 2025-03-04 | Updated: 2025-03-16 攻撃手法敵対的サンプルの検知深層学習 2025.03.04 2025.04.03 文献データベース
Privacy-preserving Machine Learning in Internet of Vehicle Applications: Fundamentals, Recent Advances, and Future Direction Authors: Nazmul Islam, Mohammad Zulkernine | Published: 2025-03-03 | Updated: 2025-07-08 プライバシーリスク管理交通シミュレーション連合学習 2025.03.03 文献データベース
TAET: Two-Stage Adversarial Equalization Training on Long-Tailed Distributions Authors: Wang YuHang, Junkang Guo, Aolei Liu, Kaihao Wang, Zaitong Wu, Zhenyu Liu, Wenfei Yin, Jian Liu | Published: 2025-03-02 | Updated: 2025-03-21 ロバスト性敵対的学習敵対的訓練 2025.03.02 2025.04.03 文献データベース
Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03 プライバシー保護モデルの頑健性保証モデル性能評価 2025.03.01 文献データベース
Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25 バックドア攻撃プロンプトインジェクション透かし 2025.02.28 文献データベース