Towards Action Hijacking of Large Language Model-based Agent Authors: Yuyang Zhang, Kangjie Chen, Jiaxin Gao, Ronghao Cui, Run Wang, Lina Wang, Tianwei Zhang | Published: 2024-12-14 | Updated: 2025-06-12 Performance EvaluationPrompt leakingLarge Language Model 2024.12.14 2025.06.14 Literature Database
Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods Authors: Joseph Pollock, Igor Shilov, Euodia Dodd, Yves-Alexandre de Montjoye | Published: 2024-11-08 | Updated: 2025-06-12 Performance EvaluationMembership InferenceDifferential Privacy 2024.11.08 2025.06.14 Literature Database
“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11 Algorithm DesignPerformance EvaluationPrivacy Protection Mechanism 2022.06.24 2025.05.28 Literature Database
Darknet Traffic Classification and Adversarial Attacks Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12 Performance EvaluationAdversarial Attack MethodsDeep Learning Method 2022.06.12 2025.05.28 Literature Database
Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 Cyber ThreatSpam DetectionPerformance Evaluation 2022.06.06 2025.05.28 Literature Database
Attack vs Benign Network Intrusion Traffic Classification Authors: M. Andrecut | Published: 2022-05-15 Performance EvaluationAttack Detectionevaluation metrics 2022.05.15 2025.05.28 Literature Database
On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13 Performance EvaluationPrivacy AssessmentModel Selection 2022.05.13 2025.05.28 Literature Database
l-Leaks: Membership Inference Attacks with Logits Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13 Performance EvaluationMembership InferenceAttack Method 2022.05.13 2025.05.28 Literature Database
A Comprehensive Benchmark Suite for Intel SGX Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13 TEE ImplementationData GenerationPerformance Evaluation 2022.05.13 2025.05.28 Literature Database
How to Combine Membership-Inference Attacks on Multiple Updated Models Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12 Performance EvaluationMembership InferenceAttack Method 2022.05.12 2025.05.28 Literature Database