Breaking the Boundaries of Long-Context LLM Inference: Adaptive KV Management on a Single Commodity GPU Authors: He Sun, Li Li, Mingjun Xiao, Chengzhong Xu | Published: 2025-06-25 Prompt InjectionMemory Management MethodEvaluation Method 2025.06.25 2025.06.27 Literature Database
JsDeObsBench: Measuring and Benchmarking LLMs for JavaScript Deobfuscation Authors: Guoqiang Chen, Xin Jin, Zhiqiang Lin | Published: 2025-06-25 Indirect Prompt Injectionコード脆弱性修復Evaluation Method 2025.06.25 2025.06.27 Literature Database
Auditing Black-Box LLM APIs with a Rank-Based Uniformity Test Authors: Xiaoyuan Zhu, Yaowen Ye, Tianyi Qiu, Hanlin Zhu, Sijun Tan, Ajraf Mannan, Jonathan Michala, Raluca Ada Popa, Willie Neiswanger | Published: 2025-06-08 | Updated: 2025-06-11 API SecurityEvaluation MethodSelection Method 2025.06.08 2025.06.13 Literature Database
DFIR-Metric: A Benchmark Dataset for Evaluating Large Language Models in Digital Forensics and Incident Response Authors: Bilel Cherif, Tamas Bisztray, Richard A. Dubniczky, Aaesha Aldahmani, Saeed Alshehhi, Norbert Tihanyi | Published: 2025-05-26 HallucinationModel Performance EvaluationEvaluation Method 2025.05.26 2025.05.28 Literature Database
Cape: Context-Aware Prompt Perturbation Mechanism with Differential Privacy Authors: Haoqi Wu, Wei Dai, Li Wang, Qiang Yan | Published: 2025-05-09 | Updated: 2025-05-15 Token Identification MethodPrivacy Design PrinciplesEvaluation Method 2025.05.09 2025.05.28 Literature Database
Towards a standardized methodology and dataset for evaluating LLM-based digital forensic timeline analysis Authors: Hudan Studiawan, Frank Breitinger, Mark Scanlon | Published: 2025-05-06 LLM Performance EvaluationLarge Language ModelEvaluation Method 2025.05.06 2025.05.27 Literature Database
GuidedBench: Measuring and Mitigating the Evaluation Discrepancies of In-the-wild LLM Jailbreak Methods Authors: Ruixuan Huang, Xunguang Wang, Zongjie Li, Daoyuan Wu, Shuai Wang | Published: 2025-02-24 | Updated: 2025-07-09 Prompt Injection脱獄手法Evaluation Method 2025.02.24 2025.07.11 Literature Database
Variational Bayesian Bow tie Neural Networks with Shrinkage Authors: Alisa Sheinkman, Sara Wade | Published: 2024-11-17 | Updated: 2024-11-19 Sparse ModelOptimization ProblemEvaluation Method 2024.11.17 2025.05.27 Literature Database
FEDLAD: Federated Evaluation of Deep Leakage Attacks and Defenses Authors: Isaac Baglin, Xiatian Zhu, Simon Hadfield | Published: 2024-11-05 | Updated: 2025-01-05 PoisoningAttack EvaluationEvaluation Method 2024.11.05 2025.05.27 Literature Database
Can LLMs be Scammed? A Baseline Measurement Study Authors: Udari Madhushani Sehwag, Kelly Patel, Francesca Mosca, Vineeth Ravi, Jessica Staddon | Published: 2024-10-14 LLM Performance EvaluationPrompt InjectionEvaluation Method 2024.10.14 2025.05.27 Literature Database