Similar Items: Can You Keep a Secret? Involuntary Information Leakage in Language Model Writing
- ForesightFlow: An Information Leakage Score Framework for Prediction Markets
- LeakDojo: Decoding the Leakage Threats of RAG Systems
- Secret Stealing Attacks on Local LLM Fine-Tuning through Supply-Chain Model Code Backdoors
- Attention Is Where You Attack
- You Snooze, You Lose: Automatic Safety Alignment Restoration through Neural Weight Translation
- The 1-Bit Barrier is Universal: k-Stage Pipeline Composition and Unified Leakage Bounds for Standard Modular Reductions in PQC Hardware