{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T02:06:38Z","timestamp":1773194798591,"version":"3.50.1"},"reference-count":28,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,12,8]],"date-time":"2025-12-08T00:00:00Z","timestamp":1765152000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,12,8]]},"DOI":"10.1109\/acsacw69556.2025.00057","type":"proceedings-article","created":{"date-parts":[[2026,3,9]],"date-time":"2026-03-09T19:56:13Z","timestamp":1773086173000},"page":"480-490","source":"Crossref","is-referenced-by-count":0,"title":["Attacks &amp; Defenses Against LLM Fingerprinting"],"prefix":"10.1109","author":[{"given":"Kevin","family":"Kurian","sequence":"first","affiliation":[{"name":"Oak Ridge National Laboratory"}]},{"given":"Ethan","family":"Holland","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory"}]},{"given":"Sean","family":"Oesch","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory"}]}],"member":"263","reference":[{"key":"ref1","article-title":"Watermarking Deep Neural Networks by Backdooring","volume-title":"27th USENIX Security Symposium (USENIX Security 18)","author":"Adi"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3593013.3594033"},{"key":"ref3","article-title":"Learning to play an adaptive cyber deception game","volume-title":"Proc. of the 21st International Conference on Autonomous Agents and Multiagent Systems","volume":"6","author":"Du"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2024.103988"},{"key":"ref5","first-page":"1","article-title":"Transformer-based conformal predictors for paraphrase detection","volume-title":"Proceedings of the 4th Workshop on Causal Inference and Machine Learning (PMLR)","volume":"152","author":"Giovannotti"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/2024.findings-naacl.7","article-title":"Language Guided Exploration for RL Agents in Text Environments","author":"Golchha","year":"2024"},{"key":"ref7","article-title":"A Survey of Adversarial Defences and Robustness in NLP","author":"Goyal","year":"2023"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613083"},{"key":"ref9","first-page":"4661","article-title":"Generalization to New Actions in Reinforcement Learning","volume-title":"Proceedings of the 37th International Conference on Machine Learning (Proceedings of Machine Learning Research, Vol. 119)","author":"Jain"},{"key":"ref10","article-title":"ImF: Implicit Fingerprint for Large Language Models","author":"jiaxuan","year":"2025"},{"key":"ref11","first-page":"534","article-title":"Stealing Machine Learning Models: Attacks and Countermeasures for Generative Adversarial Networks","volume-title":"Proceedings of the 37th Annual Computer Security Applications Conference (ACSAC)","author":"Khattak"},{"key":"ref12","first-page":"1096","article-title":"Reinforcement Learning with Combinatorial Actions: An Application to Vehicle Routing","volume":"33","author":"Kool","year":"2020","journal-title":"Advances in Neural Information Processing Systems (NeurIPS)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3389\/fdata.2021.729663"},{"issue":"1","key":"ref14","first-page":"28","article-title":"A general deep reinforcement learning hyperheuristic framework for solving combinatorial optimization problems","volume":"308","author":"Lu","year":"2023","journal-title":"European Journal of Operational Research"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2021.105400"},{"key":"ref16","article-title":"Improving LLM Agents with Reinforcement Learning on Cryptographic CTF Challenges","author":"Muzsai","year":"2025"},{"key":"ref17","article-title":"Large-Scale Deep Learning Models Stealing Through Adversarial Examples","volume-title":"Network and Distributed System Security Symposium (NDSS)","author":"Orekondy"},{"key":"ref18","article-title":"Llmmap: Fingerprinting for large language models","author":"Pasquini","year":"2024"},{"key":"ref19","article-title":"Adversarial Attacks and Defenses in Large Language Models: Old and New Threats","author":"Schwinn","year":"2023"},{"key":"ref20","article-title":"In-Context Reinforcement Learning for Variable Action Spaces","author":"Sinii","year":"2024"},{"key":"ref21","article-title":"Co-bench: Benchmarking language model agents in algorithm search for combinatorial optimization","author":"Sun","year":"2025"},{"key":"ref22","article-title":"Demystifying Embedding Spaces using Large Language Models","author":"Tennenholtz","year":"2024"},{"key":"ref23","first-page":"1358","article-title":"Is Cosine-Similarity of Embeddings Really About Similarity?","volume-title":"Proceedings of the ACM Web Conference 2024","author":"Wang"},{"key":"ref24","article-title":"Instructional Fingerprinting of Large Language Models","volume-title":"Proceedings of the 2024 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL)","author":"Wang"},{"key":"ref25","first-page":"445","article-title":"Model Stealing Attacks Against Inductive Graph Neural Networks","volume-title":"2022 IEEE Symposium on Security and Privacy (SP)","author":"Wu"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/cog47356.2020.9231622"},{"key":"ref27","article-title":"A Fingerprint for Large Language Models","author":"Yang","year":"2024"},{"key":"ref28","article-title":"Paraphrase Identification with Deep Learning: A Review of Datasets and Methods","author":"Zhou","year":"2024"}],"event":{"name":"2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)","location":"Honolulu, HI, USA","start":{"date-parts":[[2025,12,8]]},"end":{"date-parts":[[2025,12,9]]}},"container-title":["2025 Annual Computer Security Applications Conference Workshops (ACSAC Workshops)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11417955\/11417996\/11418051.pdf?arnumber=11418051","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T05:28:52Z","timestamp":1773120532000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11418051\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,12,8]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/acsacw69556.2025.00057","relation":{},"subject":[],"published":{"date-parts":[[2025,12,8]]}}}