Evaluation Method

MLLMGuard: A Multi-dimensional Safety Evaluation Suite for Multimodal Large Language Models

Authors: Tianle Gu, Zeyang Zhou, Kexin Huang, Dandan Liang, Yixu Wang, Haiquan Zhao, Yuanqi Yao, Xingge Qiao, Keqing Wang, Yujiu Yang, Yan Teng, Yu Qiao, Yingchun Wang | Published: 2024-06-11 | Updated: 2024-06-13
LLM Performance Evaluation
Dataset Generation
Evaluation Method

Ollabench: Evaluating LLMs’ Reasoning for Human-centric Interdependent Cybersecurity

Authors: Tam n. Nguyen | Published: 2024-06-11
LLM Performance Evaluation
Cybersecurity
Evaluation Method

Robust Distribution Learning with Local and Global Adversarial Corruptions

Authors: Sloan Nietert, Ziv Goldfeld, Soroosh Shafiee | Published: 2024-06-10 | Updated: 2024-06-24
Watermarking
Loss Function
Evaluation Method

Auditing Differential Privacy Guarantees Using Density Estimation

Authors: Antti Koskela, Jafar Mohammadi | Published: 2024-06-07 | Updated: 2024-10-11
Privacy Protection Method
Evaluation Method
Watermark Evaluation

ACE: A Model Poisoning Attack on Contribution Evaluation Methods in Federated Learning

Authors: Zhangchen Xu, Fengqing Jiang, Luyao Niu, Jinyuan Jia, Bo Li, Radha Poovendran | Published: 2024-05-31 | Updated: 2024-06-05
Poisoning
Evaluation Method
Defense Method

Revisit, Extend, and Enhance Hessian-Free Influence Functions

Authors: Ziao Yang, Han Yue, Jian Chen, Hongfu Liu | Published: 2024-05-25 | Updated: 2024-10-20
Poisoning
Model Performance Evaluation
Evaluation Method

Lost in the Averages: A New Specific Setup to Evaluate Membership Inference Attacks Against Machine Learning Models

Authors: Florent Guépin, Nataša Krčo, Matthieu Meeus, Yves-Alexandre de Montjoye | Published: 2024-05-24
Membership Inference
Evaluation Method

Towards Certification of Uncertainty Calibration under Adversarial Attacks

Authors: Cornelius Emde, Francesco Pinto, Thomas Lukasiewicz, Philip H. S. Torr, Adel Bibi | Published: 2024-05-22
Evaluation Method
Watermark Evaluation
Difficulty Calibration

Geometry-Aware Instrumental Variable Regression

Authors: Heiner Kremer, Bernhard Schölkopf | Published: 2024-05-19
Watermarking
Optimization Problem
Evaluation Method

A Classification-by-Retrieval Framework for Few-Shot Anomaly Detection to Detect API Injection Attacks

Authors: Udi Aharon, Ran Dubin, Amit Dvir, Chen Hajaj | Published: 2024-05-18 | Updated: 2024-09-15
Model Performance Evaluation
Anomaly Detection Method
Evaluation Method