透かし評価

Sigil: Server-Enforced Watermarking in U-Shaped Split Federated Learning via Gradient Injection

Authors: Zhengchunmin Dai, Jiaxiong Tang, Peng Sun, Honglong Chen, Liantao Wu | Published: 2025-11-18
堅牢性検証手法
透かし評価
適応型誤用検出

Robust Client-Server Watermarking for Split Federated Learning

Authors: Jiaxiong Tang, Zhengchunmin Dai, Liantao Wu, Peng Sun, Honglong Chen, Zhenfu Cao | Published: 2025-11-17
トリガーの検知
プライバシー手法
透かし評価

Enhancing All-to-X Backdoor Attacks with Optimized Target Class Mapping

Authors: Lei Wang, Yulong Tian, Hao Han, Fengyuan Xu | Published: 2025-11-17
トリガーの検知
バックドア攻撃
透かし評価

DualTAP: A Dual-Task Adversarial Protector for Mobile MLLM Agents

Authors: Fuyao Zhang, Jiaming Zhang, Che Wang, Xiongtao Sun, Yurong Hao, Guowei Guan, Wenjie Li, Longtao Huang, Wei Yang Bryan Lim | Published: 2025-11-17
プライバシー手法
生成モデル
透かし評価

SmartPoC: Generating Executable and Validated PoCs for Smart Contract Bug Reports

Authors: Longfei Chen, Ruibin Yan, Taiyu Wong, Yiyang Chen, Chao Zhang | Published: 2025-11-17
性能評価指標
自動生成フレームワーク
透かし評価

UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks

Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18
UAV個体識別
パフォーマンス評価
透かし評価

Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme

Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28
エラー解析
プロセス環境
透かし評価

On Reconstructing Training Data From Bayesian Posteriors and Trained Models

Authors: George Wynne | Published: 2025-07-24
再構成攻撃
敵対的学習
透かし評価

Early Signs of Steganographic Capabilities in Frontier LLMs

Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03
料理手順
透かし評価
隠れタスク評価

Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack

Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03
プライバシー分析
敵対的サンプル
透かし評価