Model Performance Evaluation

Audit-LLM: Multi-Agent Collaboration for Log-based Insider Threat Detection

Authors: Chengyu Song, Linru Ma, Jianming Zheng, Jinzhi Liao, Hongyu Kuang, Lin Yang | Published: 2024-08-12
Prompt Injection
Model Performance Evaluation
Log Analysis Method

MPC-Minimized Secure LLM Inference

Authors: Deevashwer Rathee, Dacheng Li, Ion Stoica, Hao Zhang, Raluca Popa | Published: 2024-08-07
LLM Performance Evaluation
MPC Algorithm
Model Performance Evaluation

Simple Perturbations Subvert Ethereum Phishing Transactions Detection: An Empirical Analysis

Authors: Ahod Alghureid, David Mohaisen | Published: 2024-08-06
Phishing Detection
Model Performance Evaluation
Defense Method

Hide and Seek: Fingerprinting Large Language Models with Evolutionary Learning

Authors: Dmitri Iourovitski, Sanat Sharma, Rakshak Talwar | Published: 2024-08-06
LLM Performance Evaluation
Prompt Injection
Model Performance Evaluation

From Generalist to Specialist: Exploring CWE-Specific Vulnerability Detection

Authors: Syafiq Al Atiiq, Christian Gehrmann, Kevin Dahlén, Karim Khalil | Published: 2024-08-05
LLM Performance Evaluation
Model Performance Evaluation
Vulnerability Management

PromptSAM+: Malware Detection based on Prompt Segment Anything Model

Authors: Xingyuan Wei, Yichen Liu, Ce Li, Ning Li, Degang Sun, Yan Wang | Published: 2024-08-04
Watermarking
Malware Classification
Model Performance Evaluation

Assessing Robustness of Machine Learning Models using Covariate Perturbations

Authors: Arun Prakash R, Anwesha Bhattacharyya, Joel Vaughan, Vijayan N. Nair | Published: 2024-08-02
Perturbation Method for Categorical Variables
Model Performance Evaluation
Stability of Predictions

Verification of Machine Unlearning is Fragile

Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01
Algorithm
Model Performance Evaluation
Computational Efficiency

Jailbreaking Text-to-Image Models with LLM-Based Agents

Authors: Yingkai Dong, Zheng Li, Xiangtao Meng, Ning Yu, Shanqing Guo | Published: 2024-08-01 | Updated: 2024-09-09
LLM Security
Prompt Injection
Model Performance Evaluation

Investigating Imperceptibility of Adversarial Attacks on Tabular Data: An Empirical Analysis

Authors: Zhipeng He, Chun Ouyang, Laith Alzubaidi, Alistair Barros, Catarina Moreira | Published: 2024-07-16 | Updated: 2024-10-04
Model Performance Evaluation
Attack Evaluation
Feature Interdependence