InfiCoEvalChain: A Blockchain-Based Decentralized Framework for Collaborative LLM Evaluation Authors: Yifan Yang, Jinjia Li, Kunxi Li, Puhao Zheng, Yuanyi Wang, Zheyan Qu, Yang Yu, Jianmin Wu, Ming Li, Hongxia Yang | Published: 2026-02-09 LLM Performance EvaluationIncentive MechanismModel evaluation methods 2026.02.09 2026.02.11 Literature Database
A Novel XAI-Enhanced Quantum Adversarial Networks for Velocity Dispersion Modeling in MaNGA Galaxies Authors: Sathwik Narkedimilli, N V Saran Kumar, Aswath Babu H, Manjunath K Vanahalli, Manish M, Vinija Jain, Aman Chadha | Published: 2025-10-28 Performance EvaluationModel evaluation methodsQuantum Information and Quantum Computing 2025.10.28 2025.10.30 Literature Database
Inducing Uncertainty for Test-Time Privacy Authors: Muhammad H. Ashiq, Peter Triantafillou, Hung Yun Tseng, Grigoris G. Chrysos | Published: 2025-09-15 AlgorithmData CurationModel evaluation methods 2025.09.15 2025.09.17 Literature Database
Engineering Trustworthy Machine-Learning Operations with Zero-Knowledge Proofs Authors: Filippo Scaramuzza, Giovanni Quattrocchi, Damian A. Tamburri | Published: 2025-05-26 Privacy IssuesModel evaluation methodsWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Deconstructing Obfuscation: A four-dimensional framework for evaluating Large Language Models assembly code deobfuscation capabilities Authors: Anton Tkachenko, Dmitrij Suskevic, Benjamin Adolphi | Published: 2025-05-26 Model evaluation methodsLarge Language ModelWatermarking Technology 2025.05.26 2025.05.28 Literature Database
Detecting Quishing Attacks with Machine Learning Techniques Through QR Code Analysis Authors: Fouad Trad, Ali Chehab | Published: 2025-05-06 Phishing DetectionModel evaluation methodsMachine Learning Algorithm 2025.05.06 2025.05.27 Literature Database
ExpProof : Operationalizing Explanations for Confidential Models with ZKPs Authors: Chhavi Yadav, Evan Monroe Laufer, Dan Boneh, Kamalika Chaudhuri | Published: 2025-02-06 | Updated: 2025-05-27 XAI (Explainable AI)Model evaluation methodsInterpretability 2025.02.06 2025.05.29 Literature Database
Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04 Model evaluation methodsMachine LearningFeature Importance Analysis 2019.09.04 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21 Terror Attack Data ClassificationModel evaluation methodsDeep Learning Method 2019.01.19 2025.05.28 Literature Database