透かし設計

Efficient and Verifiable Privacy-Preserving Convolutional Computation for CNN Inference with Untrusted Clouds

Authors: Jinyu Lu, Xinrong Sun, Yunting Tao, Tong Ji, Fanyu Kong, Guoqiang Yang | Published: 2025-08-18
アルゴリズム設計
プライバシー設計原則
透かし設計

Shadow in the Cache: Unveiling and Mitigating Privacy Risks of KV-cache in LLM Inference

Authors: Zhifan Luo, Shuo Shao, Su Zhang, Lijing Zhou, Yuke Hu, Chenxu Zhao, Zhihao Liu, Zhan Qin | Published: 2025-08-13
セキュリティ保証
再構成攻撃
透かし設計

Attacks and Defenses Against LLM Fingerprinting

Authors: Kevin Kurian, Ethan Holland, Sean Oesch | Published: 2025-08-12
プロンプトインジェクション
強化学習
透かし設計

EditMF: Drawing an Invisible Fingerprint for Your Large Language Models

Authors: Jiaxuan Wu, Yinghan Zhou, Wanli Peng, Yiming Xue, Juan Wen, Ping Zhong | Published: 2025-08-12
大規模言語モデル
著者帰属手法
透かし設計

Optimizing IoT Threat Detection with Kolmogorov-Arnold Networks (KANs)

Authors: Natalia Emelianova, Carlos Kamienski, Ronaldo C. Prati | Published: 2025-08-07
IoTネットワーク攻撃
性能評価手法
透かし設計

LIFT: Automating Symbolic Execution Optimization with Large Language Models for AI Networks

Authors: Ruoxi Wang, Kun Li, Minghui Xu, Yue Zhang, Kaidi Xu, Chunchi Liu, Yinhao Xiao, Xiuzhen Cheng | Published: 2025-07-07
バイナリ解析
性能低下の要因
透かし設計

FIDESlib: A Fully-Fledged Open-Source FHE Library for Efficient CKKS on GPUs

Authors: Carlos Agulló-Domingo, Óscar Vera-López, Seyda Guzelhan, Lohit Daksha, Aymane El Jerari, Kaustubh Shivdikar, Rashmi Agrawal, David Kaeli, Ajay Joshi, José L. Abellán | Published: 2025-07-07
メモリの評価
性能低下の要因
透かし設計

Bilateral Differentially Private Vertical Federated Boosted Decision Trees

Authors: Bokang Zhang, Zhikun Zhang, Haodong Jiang, Yang Liu, Lihao Zheng, Yuxiao Zhou, Shuaiting Huang, Junfeng Wu | Published: 2025-04-30
プライバシーリスク管理
差分プライバシー
透かし設計

Watermarking Needs Input Repetition Masking

Authors: David Khachaturov, Robert Mullins, Ilia Shumailov, Sumanth Dathathri | Published: 2025-04-16
LLM性能評価
プロンプトの検証
透かし設計

zkVC: Fast Zero-Knowledge Proof for Private and Verifiable Computing

Authors: Yancheng Zhang, Mengxin Zheng, Xun Chen, Jingtong Hu, Weidong Shi, Lei Ju, Yan Solihin, Qian Lou | Published: 2025-04-16
プライバシー保護プロトコル
性能評価手法
透かし設計