透かし

Efficient Multi-Party Secure Comparison over Different Domains with Preprocessing Assistance

Authors: Kaiwen Wang, Xiaolin Chang, Yuehan Dong, Ruichen Zhang | Published: 2026-02-23
データ前処理
安全な算術計算
透かし

Jolt Atlas: Verifiable Inference via Lookup Arguments in Zero Knowledge

Authors: Wyatt Benno, Alberto Centelles, Antoine Douchet, Khalil Gibran | Published: 2026-02-19
安全な算術計算
機械学習技術
透かし

Efficient Jailbreak Mitigation Using Semantic Linear Classification in a Multi-Staged Pipeline

Authors: Akshaj Prashanth Rao, Advait Singh, Saumya Kumaar Saksena, Dhruv Kumar | Published: 2025-12-22
プロンプトインジェクション
透かし
防御メカニズム

From Essence to Defense: Adaptive Semantic-aware Watermarking for Embedding-as-a-Service Copyright Protection

Authors: Hao Li, Yubing Ren, Yanan Cao, Yingjie Li, Fang Fang, Xuebin Wang | Published: 2025-12-18
著作権保護
透かし
透かしの耐久性

Agent Tools Orchestration Leaks More: Dataset, Benchmark, and Mitigation

Authors: Yuxuan Qiao, Dongqin Liu, Hongchang Yang, Wei Zhou, Songlin Hu | Published: 2025-12-18
データ漏洩
プライバシー保護機械学習
透かし

Privacy-Aware In-Context Learning for Large Language Models

Authors: Bishnu Bhusal, Manoj Acharya, Ramneet Kaur, Colin Samplawski, Anirban Roy, Adam D. Cobb, Rohit Chadha, Susmit Jha | Published: 2025-09-17
差分プライバシー
情報抽出
透かし

A Scalable Architecture for Efficient Multi-bit Fully Homomorphic Encryption

Authors: Jiaao Ma, Ceyu Xu, Lisa Wu Wills | Published: 2025-09-16
アルゴリズム
安全性メカニズムの分析
透かし

SecureV2X: An Efficient and Privacy-Preserving System for Vehicle-to-Everything (V2X) Applications

Authors: Joshua Lee, Ali Arastehfard, Weiran Liu, Xuegang Ban, Yuan Hong | Published: 2025-08-26
セキュリティメトリック
プライバシー管理
透かし

Learning from Few Samples: A Novel Approach for High-Quality Malcode Generation

Authors: Haijian Ma, Daizong Liu, Xiaowen Cai, Pan Zhou, Yulai Xie | Published: 2025-08-25
データ生成手法
トレーニング手法
透かし

Attack the Messages, Not the Agents: A Multi-round Adaptive Stealthy Tampering Framework for LLM-MAS

Authors: Bingyu Yan, Ziyi Zhou, Xiaoming Zhang, Chaozhuo Li, Ruilin Zeng, Yirui Qi, Tianbo Wang, Litian Zhang | Published: 2025-08-05
強化学習攻撃
攻撃アクションモデル
透かし