Performance Evaluation

Towards Action Hijacking of Large Language Model-based Agent

Authors: Yuyang Zhang, Kangjie Chen, Jiaxin Gao, Ronghao Cui, Run Wang, Lina Wang, Tianwei Zhang | Published: 2024-12-14 | Updated: 2025-06-12
Performance Evaluation
Prompt leaking
Large Language Model

Free Record-Level Privacy Risk Evaluation Through Artifact-Based Methods

Authors: Joseph Pollock, Igor Shilov, Euodia Dodd, Yves-Alexandre de Montjoye | Published: 2024-11-08 | Updated: 2025-06-12
Performance Evaluation
Membership Inference
Differential Privacy

“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning

Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11
Algorithm Design
Performance Evaluation
Privacy Protection Mechanism

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12
Performance Evaluation
Adversarial Attack Methods
Deep Learning Method

Spam Detection Using BERT

Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07
Cyber Threat
Spam Detection
Performance Evaluation

Attack vs Benign Network Intrusion Traffic Classification

Authors: M. Andrecut | Published: 2022-05-15
Performance Evaluation
Attack Detection
evaluation metrics

On the Importance of Architecture and Feature Selection in Differentially Private Machine Learning

Authors: Wenxuan Bao, Luke A. Bauer, Vincent Bindschaedler | Published: 2022-05-13
Performance Evaluation
Privacy Assessment
Model Selection

l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13
Performance Evaluation
Membership Inference
Attack Method

A Comprehensive Benchmark Suite for Intel SGX

Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13
TEE Implementation
Data Generation
Performance Evaluation

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12
Performance Evaluation
Membership Inference
Attack Method