透かし評価

UAV Individual Identification via Distilled RF Fingerprints-Based LLM in ISAC Networks

Authors: Haolin Zheng, Ning Gao, Donghong Cai, Shi Jin, Michail Matthaiou | Published: 2025-08-18
UAV個体識別
パフォーマンス評価
透かし評価

Characterizing the Sensitivity to Individual Bit Flips in Client-Side Operations of the CKKS Scheme

Authors: Matias Mazzanti, Augusto Vega, Esteban Mocskos | Published: 2025-07-28
エラー解析
プロセス環境
透かし評価

On Reconstructing Training Data From Bayesian Posteriors and Trained Models

Authors: George Wynne | Published: 2025-07-24
再構成攻撃
敵対的学習
透かし評価

Early Signs of Steganographic Capabilities in Frontier LLMs

Authors: Artur Zolkowski, Kei Nishimura-Gasparian, Robert McCarthy, Roland S. Zimmermann, David Lindner | Published: 2025-07-03
料理手順
透かし評価
隠れタスク評価

Privacy Leaks by Adversaries: Adversarial Iterations for Membership Inference Attack

Authors: Jing Xue, Zhishen Sun, Haishan Ye, Luo Luo, Xiangyu Chang, Ivor Tsang, Guang Dai | Published: 2025-06-03
プライバシー分析
敵対的サンプル
透かし評価

CyberGym: Evaluating AI Agents’ Cybersecurity Capabilities with Real-World Vulnerabilities at Scale

Authors: Zhun Wang, Tianneng Shi, Jingxuan He, Matthew Cai, Jialin Zhang, Dawn Song | Published: 2025-06-03
プロンプトインジェクション
動的分析手法
透かし評価

UniNet: A Unified Multi-granular Traffic Modeling Framework for Network Security

Authors: Binghui Wu, Dinil Mon Divakaran, Mohan Gurusamy | Published: 2025-03-06 | Updated: 2025-07-03
IoTトラフィック分析
ネットワークトラフィックの変更
透かし評価

Protecting Users From Themselves: Safeguarding Contextual Privacy in Interactions with Conversational Agents

Authors: Ivoline Ngong, Swanand Kadhe, Hao Wang, Keerthiram Murugesan, Justin D. Weisz, Amit Dhurandhar, Karthikeyan Natesan Ramamurthy | Published: 2025-02-22 | Updated: 2025-07-28
プライバシーリスク管理
プロンプトリーキング
透かし評価

RAG-WM: An Efficient Black-Box Watermarking Approach for Retrieval-Augmented Generation of Large Language Models

Authors: Peizhuo Lv, Mengjie Sun, Hao Wang, Xiaofeng Wang, Shengzhi Zhang, Yuxuan Chen, Kai Chen, Limin Sun | Published: 2025-01-09
RAG
ウォーターマーキング
透かし評価

RTLMarker: Protecting LLM-Generated RTL Copyright via a Hardware Watermarking Framework

Authors: Kun Wang, Kaiyan Chang, Mengdi Wang, Xinqi Zou, Haobo Xu, Yinhe Han, Ying Wang | Published: 2025-01-05
プロンプトインジェクション
透かしの耐久性
透かし評価