透かし

Transportation Cyber Incident Awareness through Generative AI-Based Incident Analysis and Retrieval-Augmented Question-Answering Systems

Authors: Ostonya Thomas, Muhaimin Bin Munir, Jean-Michel Tine, Mizanur Rahman, Yuchen Cai, Khandakar Ashrafi Akbar, Md Nahiyan Uddin, Latifur Khan, Trayce Hockstad, Mashrur Chowdhury | Published: 2025-08-04
RAG
交通シミュレーション
透かし

SoftPUF: a Software-Based Blockchain Framework using PUF and Machine Learning

Authors: S M Mostaq Hossain, Sheikh Ghafoor, Kumar Yelamarthi, Venkata Prasanth Yanambaka | Published: 2025-08-04
ブロックチェーン戦略
脆弱性分析
透かし

A Survey on Data Security in Large Language Models

Authors: Kang Chen, Xiuze Zhou, Yuanguo Lin, Jinhe Su, Yuanhui Yu, Li Shen, Fan Lin | Published: 2025-08-04
インダイレクトプロンプトインジェクション
プロンプトリーキング
透かし

FPEdit: Robust LLM Fingerprinting through Localized Knowledge Editing

Authors: Shida Wang, Chaohu Liu, Yubo Wang, Linli Xu | Published: 2025-08-04
ディープフェイク
生成AI向け電子透かし
透かし

Watermarking Degrades Alignment in Language Models: Analysis and Mitigation

Authors: Apurv Verma, NhatHai Phan, Shubhendu Trivedi | Published: 2025-06-04 | Updated: 2025-07-10
性能評価指標
生成AI向け電子透かし
透かし

The Steganographic Potentials of Language Models

Authors: Artem Karpov, Tinuade Adeleke, Seong Hah Cho, Natalia Perez-Campanero | Published: 2025-05-06
RAG
著者貢献
透かし

Steering the CensorShip: Uncovering Representation Vectors for LLM “Thought” Control

Authors: Hannah Cyberey, David Evans | Published: 2025-04-23
プロンプトインジェクション
心理的操作
透かし

Snorkeling in dark waters: A longitudinal surface exploration of unique Tor Hidden Services (Extended Version)

Authors: Alfonso Rodriguez Barredo-Valenzuela, Sergio Pastrana Portillo, Guillermo Suarez-Tangil | Published: 2025-04-23
ネットワーク脅威検出
研究方法論
透かし

MCMC for Bayesian estimation of Differential Privacy from Membership Inference Attacks

Authors: Ceren Yildirim, Kamer Kaya, Sinan Yildirim, Erkay Savas | Published: 2025-04-23
プライバシー保護データマイニング
メンバーシップ推論
透かし

A Collaborative Intrusion Detection System Using Snort IDS Nodes

Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23
ネットワーク脅威検出
マルウェア検出手法
透かし