Evaluation Method

SSCAE — Semantic, Syntactic, and Context-aware natural language Adversarial Examples generator

Authors: Javad Rafiei Asl, Mohammad H. Rafiei, Manar Alohaly, Daniel Takabi | Published: 2024-03-18
Dynamic Threshold Calculation
Adversarial Example
Evaluation Method

An Extensive Comparison of Static Application Security Testing Tools

Authors: Matteo Esposito, Valentina Falaschi, Davide Falessi | Published: 2024-03-14
Toolkit Comparison
Vulnerability Management
Evaluation Method

CovRL: Fuzzing JavaScript Engines with Coverage-Guided Reinforcement Learning for LLM-based Mutation

Authors: Jueon Eom, Seyeon Jeong, Taekyoung Kwon | Published: 2024-02-19
Fuzzing
Reinforcement Learning
Evaluation Method

Maatphor: Automated Variant Analysis for Prompt Injection Attacks

Authors: Ahmed Salem, Andrew Paverd, Boris Köpf | Published: 2023-12-12
LLM Security
Prompt Injection
Evaluation Method

Automated discovery of trade-off between utility, privacy and fairness in machine learning models

Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27
Trade-off Analysis
Privacy Protection Method
Evaluation Method

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release

Authors: Jie Fu, Qingqing Ye, Haibo Hu, Zhili Chen, Lulu Wang, Kuncan Wang, Xun Ran | Published: 2023-11-23 | Updated: 2023-11-29
Privacy Protection
Optimization Methods
Evaluation Method

How Far Have We Gone in Vulnerability Detection Using Large Language Models

Authors: Zeyu Gao, Hao Wang, Yuchen Zhou, Wenyu Zhu, Chao Zhang | Published: 2023-11-21 | Updated: 2023-12-22
Code Change Analysis
Vulnerability detection
Evaluation Method

From Principle to Practice: Vertical Data Minimization for Machine Learning

Authors: Robin Staab, Nikola Jovanović, Mislav Balunović, Martin Vechev | Published: 2023-11-17 | Updated: 2023-11-22
Data Management System
Privacy Protection
Evaluation Method

FedTruth: Byzantine-Robust and Backdoor-Resilient Federated Learning Framework

Authors: Sheldon C. Ebron Jr., Kan Yang | Published: 2023-11-17
Model Architecture
Attack Method
Evaluation Method

DEMASQ: Unmasking the ChatGPT Wordsmith

Authors: Kavita Kumari, Alessandro Pegoraro, Hossein Fereidooni, Ahmad-Reza Sadeghi | Published: 2023-11-08
Energy-Based Model
Prompt Injection
Evaluation Method