透かし

A Collaborative Intrusion Detection System Using Snort IDS Nodes

Authors: Tom Davies, Max Hashem Eiza, Nathan Shone, Rob Lyon | Published: 2025-04-23
ネットワーク脅威検出
マルウェア検出手法
透かし

PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization

Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02
モデル性能評価
大規模言語モデル
透かし

Steering Dialogue Dynamics for Robustness against Multi-turn Jailbreaking Attacks

Authors: Hanjiang Hu, Alexander Robey, Changliu Liu | Published: 2025-02-28 | Updated: 2025-08-25
バックドア攻撃
プロンプトインジェクション
透かし

Generating Privacy-Preserving Personalized Advice with Zero-Knowledge Proofs and LLMs

Authors: Hiroki Watanabe, Motonobu Uchikoshi | Published: 2025-02-10 | Updated: 2025-04-24
アライメント
プライバシー保護データマイニング
透かし

PrivDiffuser: Privacy-Guided Diffusion Model for Data Obfuscation in Sensor Networks

Authors: Xin Yang, Omid Ardakanian | Published: 2024-12-19 | Updated: 2025-08-05
モデルインバージョン
差分プライバシー
透かし

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
モデルの頑健性保証
敵対的サンプル
透かし

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10
モデルの頑健性保証
敵対的攻撃
透かし

Robust Decentralized Learning Using ADMM with Unreliable Agents

Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21
ロバスト性向上手法
収束特性
透かし

CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions

Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09
収束特性
解釈手法
透かし

Computation on Encrypted Data using Data Flow Authentication

Authors: Andreas Fischer, Benny Fuhry, Florian Kerschbaum, Eric Bodden | Published: 2017-10-01
情報セキュリティ
情報フロー制御
透かし