Showing 1–20 of 47 results
/ Date/ Name
Nov 20, 2025The Oracle and The Prism: A Decoupled and Efficient Framework for Generative Recommendation ExplanationDec 3, 2025Statistical and Temporal Analysis of Multi-component Burst-clusters from the Repeating FRB 20190520BFeb 17, 2025Balancing Truthfulness and Informativeness with Uncertainty-Aware Instruction Fine-TuningMay 21, 2025Silent Leaks: Implicit Knowledge Extraction Attack on RAG Systems through Benign QueriesJan 12, 2026Beyond Hard Masks: Progressive Token Evolution for Diffusion Language ModelsJan 30, 2025GuardReasoner: Towards Reasoning-based LLM SafeguardsMar 16, 2026Gym-V: A Unified Vision Environment System for Agentic Vision ResearchApr 8, 2026ARuleCon: Agentic Security Rule ConversionJul 17, 2017PDD Graph: Bridging Electronic Medical Records and Biomedical Knowledge Graphs via Entity LinkingMar 12, 2025Prompt Inversion Attack against Collaborative Inference of Large Language ModelsMar 12, 2025Sparse Autoencoder as a Zero-Shot Classifier for Concept Erasing in Text-to-Image Diffusion ModelsApr 22, 2025A Comprehensive Survey in LLM(-Agent) Full Stack Safety: Data, Training and DeploymentNov 5, 2025SWAP: Towards Copyright Auditing of Soft Prompts via Sequential WatermarkingMar 29, 2025Efficient Inference for Large Reasoning Models: A SurveyOct 3, 2025DMark: Order-Agnostic Watermarking for Diffusion Large Language ModelsMar 3, 2026Efficient Self-Evaluation for Diffusion Language Models via Sequence RegenerationFeb 7, 2026MemPot: Defending Against Memory Extraction Attack with Optimized HoneypotsMar 18, 2026STEP: Detecting Audio Backdoor Attacks via Stability-based Trigger Exposure ProfilingNov 9, 2025ReProbe: Efficient Test-Time Scaling of Multi-Step Reasoning by Probing Internal States of Large Language ModelsOct 1, 2022zkBridge: Trustless Cross-chain Bridges Made Practical