SilentStriker:Toward Stealthy Bit-Flip Attacks on Large Language Models Authors: Haotian Xu, Qingsong Peng, Jie Shi, Huadi Zheng, Yu Li, Cheng Zhuo | Published: 2025-09-22 Indirect Prompt InjectionModel DoS評価メトリクス 2025.09.22 2025.09.24 Literature Database
Breaking Out from the TESSERACT: Reassessing ML-based Malware Detection under Spatio-Temporal Drift Authors: Theo Chow, Mario D'Onghia, Lorenz Linhardt, Zeliang Kan, Daniel Arp, Lorenzo Cavallaro, Fabio Pierazzi | Published: 2025-06-30 BiasDataset for Malware Classification評価メトリクス 2025.06.30 2025.07.02 Literature Database
Counterfactual Influence as a Distributional Quantity Authors: Matthieu Meeus, Igor Shilov, Georgios Kaissis, Yves-Alexandre de Montjoye | Published: 2025-06-25 Privacy ProtectionPerformance Evaluation Metrics評価メトリクス 2025.06.25 2025.06.27 Literature Database
SoK: Data Reconstruction Attacks Against Machine Learning Models: Definition, Metrics, and Benchmark Authors: Rui Wen, Yiyong Liu, Michael Backes, Yang Zhang | Published: 2025-06-09 Model DoS再構成アルゴリズム評価メトリクス 2025.06.09 2025.06.11 Literature Database
PsyScam: A Benchmark for Psychological Techniques in Real-World Scams Authors: Shang Ma, Tianyi Ma, Jiahao Liu, Wei Song, Zhenkai Liang, Xusheng Xiao, Yanfang Ye | Published: 2025-05-21 | Updated: 2025-09-22 Phishing Attack心理的手法評価メトリクス 2025.05.21 2025.09.24 Literature Database
Interpreting GNN-based IDS Detections Using Provenance Graph Structural Features Authors: Kunal Mukherjee, Joshua Wiedemeier, Tianhao Wang, Muhyun Kim, Feng Chen, Murat Kantarcioglu, Kangkook Jee | Published: 2023-06-01 | Updated: 2025-09-22 Security AnalysisMalware Detection Scenario評価メトリクス 2023.06.01 2025.09.24 Literature Database