透かし技術

Differential Privacy Analysis of Decentralized Gossip Averaging under Varying Threat Models

Authors: Antti Koskela, Tejas Kulkarni | Published: 2025-05-26
プライバシー問題
差分プライバシー
透かし技術

Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities

Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26
モデル評価手法
大規模言語モデル
透かし技術

Fixing 7,400 Bugs for 1$: Cheap Crash-Site Program Repair

Authors: Han Zheng, Ilia Shumailov, Tianqi Fan, Aiden Hall, Mathias Payer | Published: 2025-05-19
LLMセキュリティ
バグ修正手法
透かし技術

MUBox: A Critical Evaluation Framework of Deep Machine Unlearning

Authors: Xiang Li, Bhavani Thuraisingham, Wenqi Wei | Published: 2025-05-13
クラス別忘却評価
毒データの検知
透かし技術

Defending against Indirect Prompt Injection by Instruction Detection

Authors: Tongyu Wen, Chenglong Wang, Xiyuan Yang, Haoyu Tang, Yueqi Xie, Lingjuan Lyu, Zhicheng Dou, Fangzhao Wu | Published: 2025-05-08 | Updated: 2025-09-17
プロンプトの検証
評価手法
透かし技術

Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks

Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08
プロンプトリーキング
攻撃手法
透かし技術

Revealing Weaknesses in Text Watermarking Through Self-Information Rewrite Attacks

Authors: Yixin Cheng, Hongcheng Guo, Yangming Li, Leonid Sigal | Published: 2025-05-08
プロンプトリーキング
攻撃手法
透かし技術

On the Price of Differential Privacy for Hierarchical Clustering

Authors: Chengyuan Deng, Jie Gao, Jalaj Upadhyay, Chen Wang, Samson Zhou | Published: 2025-04-22
グラフ構築
プライバシー保護フレームワーク
透かし技術

GIFDL: Generated Image Fluctuation Distortion Learning for Enhancing Steganographic Security

Authors: Xiangkun Wang, Kejiang Chen, Yuang Qi, Ruiheng Liu, Weiming Zhang, Nenghai Yu | Published: 2025-04-21
敵対的学習
生成モデル
透かし技術

Mining Characteristics of Vulnerable Smart Contracts Across Lifecycle Stages

Authors: Hongli Peng, Xiaoqi Li, Wenkai Li | Published: 2025-04-21
スマートコントラクト監査
脆弱性研究
透かし技術