Performance Evaluation

BackdoorDM: A Comprehensive Benchmark for Backdoor Learning on Diffusion Model

Authors: Weilin Lin, Nanjun Zhou, Yanyun Wang, Jianze Li, Hui Xiong, Li Liu | Published: 2025-02-17 | Updated: 2025-07-21
Trigger Detection
Backdoor Attack
Performance Evaluation

In-Context Unlearning: Language Models as Few Shot Unlearners

Authors: Martin Pawelczyk, Seth Neel, Himabindu Lakkaraju | Published: 2023-10-11 | Updated: 2024-06-06
Data Leakage
Performance Evaluation
Machine Learning Technology

A Semantic Invariant Robust Watermark for Large Language Models

Authors: Aiwei Liu, Leyi Pan, Xuming Hu, Shiao Meng, Lijie Wen | Published: 2023-10-10 | Updated: 2024-05-19
Watermarking
Prompt Injection
Performance Evaluation

Differentially Private Multi-Site Treatment Effect Estimation

Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10
Privacy Classification
Performance Evaluation
Information Hiding Techniques

Breaking On-Chip Communication Anonymity using Flow Correlation Attacks

Authors: Hansika Weerasena, Prabhat Mishra | Published: 2023-09-27 | Updated: 2025-05-06
Performance Evaluation
Traffic Correlation Attack
Defense Method

LinGCN: Structural Linearized Graph Convolutional Network for Homomorphically Encrypted Inference

Authors: Hongwu Peng, Ran Ran, Yukui Luo, Jiahui Zhao, Shaoyi Huang, Kiran Thorat, Tong Geng, Chenghong Wang, Xiaolin Xu, Wujie Wen, Caiwen Ding | Published: 2023-09-25 | Updated: 2023-10-04
Watermarking
Performance Evaluation
Deep Learning Method

Multi-Source Domain Adaptation meets Dataset Distillation through Dataset Dictionary Learning

Authors: Eduardo Fernandes Montesuma, Fred Ngolè Mboula, Antoine Souloumiac | Published: 2023-09-14
Watermarking
Data Generation
Performance Evaluation

Optimized Deep Learning Models for Malware Detection under Concept Drift

Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01
Performance Evaluation
Optimization Methods
Deep Learning Method

A Modular and Adaptive System for Business Email Compromise Detection

Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21
Business Email Compromise
Phishing Detection
Performance Evaluation

PentestGPT: An LLM-empowered Automatic Penetration Testing Tool

Authors: Gelei Deng, Yi Liu, Víctor Mayoral-Vilches, Peng Liu, Yuekang Li, Yuan Xu, Tianwei Zhang, Yang Liu, Martin Pinzger, Stefan Rass | Published: 2023-08-13 | Updated: 2024-06-02
Prompt Injection
Penetration Testing Methods
Performance Evaluation