Evaluation Method

Using Large Language Models for Template Detection from Security Event Logs

Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-04-14
LLM Performance Evaluation
Algorithm
Evaluation Method

2DSig-Detect: a semi-supervised framework for anomaly detection on image data using 2D-signatures

Authors: Xinheng Xie, Kureha Yamaguchi, Margaux Leblanc, Simon Malzard, Varun Chhabra, Victoria Nockles, Yue Wu | Published: 2024-09-08 | Updated: 2025-03-20
Backdoor Attack
Poisoning
Evaluation Method

MILE: A Mutation Testing Framework of In-Context Learning Systems

Authors: Zeming Wei, Yihao Zhang, Meng Sun | Published: 2024-09-07
Few-Shot Learning
Mutation Testing
Evaluation Method

Comment on Revisiting Neural Program Smoothing for Fuzzing

Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06
Watermarking
Program Analysis
Evaluation Method

Boosting Certified Robustness for Time Series Classification with Efficient Self-Ensemble

Authors: Chang Dong, Zhengyang Li, Liangwei Zheng, Weitong Chen, Wei Emma Zhang | Published: 2024-09-04 | Updated: 2024-09-19
Adversarial Example
Evaluation Method
Watermark Evaluation

AdvSecureNet: A Python Toolkit for Adversarial Machine Learning

Authors: Melih Catal, Manuel Günther | Published: 2024-09-04
Toolkit Comparison
Adversarial Training
Evaluation Method

DogeFuzz: A Simple Yet Efficient Grey-box Fuzzer for Ethereum Smart Contracts

Authors: Ismael Medeiros, Fausto Carvalho, Alexandre Ferreira, Rodrigo Bonifácio, Fabiano Cavalcanti Fernandes | Published: 2024-09-03
Smart Contract
Blockchain Technology
Evaluation Method

Comprehensive Botnet Detection by Mitigating Adversarial Attacks, Navigating the Subtleties of Perturbation Distances and Fortifying Predictions with Conformal Layers

Authors: Rahul Yumlembam, Biju Issac, Seibu Mary Jacob, Longzhi Yang | Published: 2024-09-01
Poisoning
Adversarial Example
Evaluation Method

Top Score on the Wrong Exam: On Benchmarking in Machine Learning for Vulnerability Detection

Authors: Niklas Risse, Jing Liu, Marcel Böhme | Published: 2024-08-23 | Updated: 2025-04-23
Security Analysis
Vulnerability Management
Evaluation Method

Tracing Privacy Leakage of Language Models to Training Data via Adjusted Influence Functions

Authors: Jinxin Liu, Zao Yang | Published: 2024-08-20 | Updated: 2024-09-05
LLM Performance Evaluation
Privacy Protection Method
Evaluation Method