SafePTR: Token-Level Jailbreak Defense in Multimodal LLMs via Prune-then-Restore Mechanism Authors: Beitao Chen, Xinyu Lyu, Lianli Gao, Jingkuan Song, Heng Tao Shen | Published: 2025-07-02 プロンプトインジェクション脱獄攻撃手法透明性と検証 2025.07.02 文献データベース
Verifiable evaluations of machine learning models using zkSNARKs Authors: Tobin South, Alexander Camuto, Shrey Jain, Shayla Nguyen, Robert Mahari, Christian Paquin, Jason Morton, Alex 'Sandy' Pentland | Published: 2024-02-05 | Updated: 2024-05-22 モデル性能評価透かし評価透明性と検証 2024.02.05 2025.04.03 文献データベース
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13 モデル性能評価侵入検知システム透明性と検証 2022.07.13 2025.04.03 文献データベース
How to Peel a Million: Validating and Expanding Bitcoin Clusters Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27 データ管理システム取引の利益やパフォーマンス透明性と検証 2022.05.27 2025.04.03 文献データベース
Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31 IoTセキュリティXAIの応用透明性と検証 2021.10.31 2025.04.03 文献データベース
Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03 バックドア攻撃モデル抽出攻撃の検知透明性と検証 2018.09.03 2025.04.03 文献データベース