Performance Evaluation

DP2Guard: A Lightweight and Byzantine-Robust Privacy-Preserving Federated Learning Scheme for Industrial IoT

Authors: Baofu Han, Bing Li, Yining Qi, Raja Jurdak, Kaibin Huang, Chau Yuen | Published: 2025-07-22
Blockchain Strategy
勾配分割手法
Performance Evaluation

A Privacy-Preserving Indoor Localization System based on Hierarchical Federated Learning

Authors: Masood Jan, Wafa Njima, Xun Zhang | Published: 2025-07-02
Privacy Assurance
Distributed Learning
Performance Evaluation

OBLIVIATE: Robust and Practical Machine Unlearning for Large Language Models

Authors: Xiaoyu Xu, Minxin Du, Qingqing Ye, Haibo Hu | Published: 2025-05-07
Token Identification Method
Model DoS
Performance Evaluation

LLMs’ Suitability for Network Security: A Case Study of STRIDE Threat Modeling

Authors: AbdulAziz AbdulGhaffar, Ashraf Matrawy | Published: 2025-05-07
LLM Security
Performance Evaluation
Vulnerability Analysis

Data Encryption Battlefield: A Deep Dive into the Dynamic Confrontations in Ransomware Attacks

Authors: Arash Mahboubi, Hamed Aboutorab, Seyit Camtepe, Hang Thanh Bui, Khanh Luong, Keyvan Ansari, Shenlu Wang, Bazara Barry | Published: 2025-04-29
Online Learning
Poisoning
Performance Evaluation

CodeBC: A More Secure Large Language Model for Smart Contract Code Generation in Blockchain

Authors: Lingxiang Wang, Hainan Zhang, Qinnan Zhang, Ziwei Wang, Hongwei Zheng, Jin Dong, Zhiming Zheng | Published: 2025-04-28 | Updated: 2025-05-07
Program Verification
Performance Evaluation
Vulnerability Analysis

Detecting Benchmark Contamination Through Watermarking

Authors: Tom Sander, Pierre Fernandez, Saeed Mahloujifar, Alain Durmus, Chuan Guo | Published: 2025-02-24 | Updated: 2025-07-21
Watermarking
Data Contamination Detection
Performance Evaluation

BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model

Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21
Trigger Detection
Backdoor Attack
Performance Evaluation

In-Context Unlearning: Language Models as Few Shot Unlearners

Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06
Data Leakage
Performance Evaluation
Machine Learning Technology

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation