透かし設計

Exploiting the Potential of Linearity in Automatic Differentiation and Computational Cryptography

Authors: Giulia Giusti | Published: 2025-10-20
暗号化技術
透かし設計
量子計算手法

RLCracker: Exposing the Vulnerability of LLM Watermarks with Adaptive RL Attacks

Authors: Hanbo Huang, Yiran Zhang, Hao Zheng, Xuan Gong, Yihan Li, Lin Liu, Shiyu Liang | Published: 2025-09-25
LLMの安全機構の解除
プロンプトインジェクション
透かし設計

Cryptographic Backdoor for Neural Networks: Boon and Bane

Authors: Anh Tu Ngo, Anupam Chattopadhyay, Subhamoy Maitra | Published: 2025-09-25
トリガーの検知
バックドア攻撃
透かし設計

Character-Level Perturbations Disrupt LLM Watermarks

Authors: Zhaoxi Zhang, Xiaomei Zhang, Yanjun Zhang, He Zhang, Shirui Pan, Bo Liu, Asif Qumer Gill, Leo Yu Zhang | Published: 2025-09-11
攻撃手法
生成AI向け電子透かし
透かし設計

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
アルゴリズム設計
プライバシー設計原則
透かし設計

Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference

Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13
セキュリティ保証
再構成攻撃
透かし設計

Attacks and Defenses Against LLM Fingerprinting

Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12
プロンプトインジェクション
強化学習
透かし設計

EditMF: Drawing an Invisible Fingerprint for Your Large Language Models

Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12
大規模言語モデル
著者帰属手法
透かし設計

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07
IoTネットワーク攻撃
性能評価手法
透かし設計

LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks

Authors: Ruoxi Wang, Kun Li, Minghui Xu, Yue Zhang, Kaidi Xu, Chunchi Liu, Yinhao Xiao, Xiuzhen Cheng | Published: 2025-07-07
バイナリ解析
性能低下の要因
透かし設計