Model Performance Evaluation

PiCo: Jailbreaking Multimodal Large Language Models via $\textbf{Pi}$ctorial $\textbf{Co}$de Contextualization

Authors: Aofan Liu, Lulu Tang, Ting Pan, Yuguo Yin, Bin Wang, Ao Yang | Published: 2025-04-02 | Updated: 2025-04-07
Model Performance Evaluation
Large Language Model
Watermark

ATOM: A Framework of Detecting Query-Based Model Extraction Attacks for Graph Neural Networks

Authors: Zhan Cheng, Bolin Shen, Tianming Sha, Yuan Gao, Shibo Li, Yushun Dong | Published: 2025-03-20
Graph Neural Network
Model Performance Evaluation
Analysis of Detection Methods

ToxicSQL: Migrating SQL Injection Threats into Text-to-SQL Models via Backdoor Attack

Authors: Meiyu Lin, Haichuan Zhang, Jiale Lao, Renyuan Li, Yuanchun Zhou, Carl Yang, Yang Cao, Mingjie Tang | Published: 2025-03-07 | Updated: 2025-04-03
Backdoor Detection
Backdoor Attack
Model Performance Evaluation

SpinML: Customized Synthetic Data Generation for Private Training of Specialized ML Models

Authors: Jiang Zhang, Rohan Xavier Sequeira, Konstantinos Psounis | Published: 2025-03-05 | Updated: 2025-04-07
Privacy Protection
Model Performance Evaluation
Differential Privacy

Theoretical Insights in Model Inversion Robustness and Conditional Entropy Maximization for Collaborative Inference Systems

Authors: Song Xia, Yi Yu, Wenhan Yang, Meiwen Ding, Zhuo Chen, Ling-Yu Duan, Alex C. Kot, Xudong Jiang | Published: 2025-03-01 | Updated: 2025-04-03
Privacy Protection
Certified Robustness
Model Performance Evaluation

Efficient Model Compression for Bayesian Neural Networks

Authors: Diptarka Saha, Zihe Liu, Feng Liang | Published: 2024-11-01
Sparse Model
Model Performance Evaluation
Optimization Problem

Automated Trustworthiness Oracle Generation for Machine Learning Text Classifiers

Authors: Lam Nguyen Tung, Steven Cho, Xiaoning Du, Neelofar Neelofar, Valerio Terragni, Stefano Ruberto, Aldeida Aleti | Published: 2024-10-30 | Updated: 2025-04-23
XAI (Explainable AI)
Model Performance Evaluation
Reliability Analysis

Diffuse or Confuse: A Diffusion Deepfake Speech Dataset

Authors: Anton Firc, Kamil Malinka, Petr Hanáček | Published: 2024-10-09
Dataset Generation
Model Performance Evaluation
Speech Synthesis Technology

Impact of White-Box Adversarial Attacks on Convolutional Neural Networks

Authors: Rakesh Podder, Sudipto Ghosh | Published: 2024-10-02
Model Performance Evaluation
Attack Method
Adversarial Example

The poison of dimensionality

Authors: Lê-Nguyên Hoang | Published: 2024-09-25
Poisoning
Model Performance Evaluation
Loss Function