透かし技術

Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages

Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21
スマートコントラクト監査
脆弱性研究
透かし技術

How Effective Can Dropout Be in Multiple Instance Learning ?

Authors: Wenhui Zhu, Peijie Qiu, Xiwen Chen, Zhangsihao Yang, Aristeidis Sotiras, Abolfazl Razi, Yalin Wang | Published: 2025-04-21
パフォーマンス評価
マルチクラス分類
透かし技術

BadApex: Backdoor Attack Based on Adaptive Optimization Mechanism of Black-box Large Language Models

Authors: Zhengxian Wu, Juan Wen, Wanli Peng, Ziwei Zhang, Yinghan Zhou, Yiming Xue | Published: 2025-04-18 | Updated: 2025-04-21
プロンプトインジェクション
攻撃検出
透かし技術

MiZero: The Shadowy Defender Against Text Style Infringements

Authors: Ziwei Zhang, Juan Wen, Wanli Peng, Zhengxian Wu, Yinghan Zhou, Yiming Xue | Published: 2025-03-30 | Updated: 2025-05-29
プロンプトインジェクション
知的財産保護
透かし技術

A Selective Homomorphic Encryption Approach for Faster Privacy-Preserving Federated Learning

Authors: Abdulkadir Korkmaz, Praveen Rao | Published: 2025-01-22 | Updated: 2025-03-27
プライバシー問題
透かし技術
連合学習

ExpShield: Safeguarding Web Text from Unauthorized Crawling and Language Modeling Exploitation

Authors: Ruixuan Liu, Toan Tran, Tianhao Wang, Hongsheng Hu, Shuo Wang, Li Xiong | Published: 2024-12-30 | Updated: 2025-05-07
テキストの摂動手法
バックドアモデルの検知
透かし技術

CTINexus: Automatic Cyber Threat Intelligence Knowledge Graph Construction Using Large Language Models

Authors: Yutong Cheng, Osama Bajaber, Saimon Amanuel Tsegai, Dawn Song, Peng Gao | Published: 2024-10-28 | Updated: 2025-04-21
サイバー脅威インテリジェンス
プロンプトリーキング
透かし技術

“Yes, My LoRD.” Guiding Language Model Extraction with Locality Reinforced Distillation

Authors: Zi Liang, Qingqing Ye, Yanyun Wang, Sen Zhang, Yaxin Xiao, Ronghua Li, Jianliang Xu, Haibo Hu | Published: 2024-09-04 | Updated: 2025-05-19
LLMセキュリティ
モデル抽出攻撃
透かし技術

Undetectable Watermarks for Language Models

Authors: Miranda Christ, Sam Gunn, Or Zamir | Published: 2023-05-25
プロンプトリーキング
生成AI向け電子透かし
透かし技術

Graph Backdoor

Authors: Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang | Published: 2020-06-21 | Updated: 2021-08-10
グラフニューラルネットワーク
攻撃手法
透かし技術