Evaluation Method

Leveraging Large Language Models for Trustworthiness Assessment of Web Applications

Authors: Oleksandr Yarotskyi, José D'Abruzzo Pereira, João R. Campos | Published: 2026-03-24
セキュアコーディング
Prompt leaking
Evaluation Method

Targeted Adversarial Traffic Generation : Black-box Approach to Evade Intrusion Detection Systems in IoT Networks

Authors: Islam Debicha, Tayeb Kenaza, Ishak Charfi, Salah Mosbah, Mehdi Sehaki, Jean-Michel Dricot | Published: 2026-03-24
Dataset evaluation
Adversarial Example Detection
Evaluation Method

An Experimental Study of Machine Learning-Based Intrusion Detection for OPC UA over Industrial Private 5G Networks

Authors: Song Son Ha, Kunal Singh, Florian Foerster, Henry Beuster, Tim Kittel, Dominik Merli, Gerd Scholl | Published: 2026-03-24
Machine Learning Application
Feature Extraction
Evaluation Method

Not All Tokens Are Created Equal: Query-Efficient Jailbreak Fuzzing for LLMs

Authors: Wenyu Chen, Xiangtao Meng, Chuanchao Zang, Li Wang, Xinyu Gao, Jianing Wang, Peng Zhan, Zheng Li, Shanqing Guo | Published: 2026-03-24
LLM Performance Evaluation
Prompt Injection
Evaluation Method

A Critical Review on the Effectiveness and Privacy Threats of Membership Inference Attacks

Authors: Najeeb Jebreel, David Sánchez, Josep Domingo-Ferrer | Published: 2026-03-24
Privacy Leakage
Membership Inference
Evaluation Method

Beyond Theoretical Bounds: Empirical Privacy Loss Calibration for Text Rewriting Under Local Differential Privacy

Authors: Weijun Li, Arnaud Grivet Sébert, Qiongkai Xu, Annabelle McIver, Mark Dras | Published: 2026-03-24
Dataset evaluation
Differential Privacy
Evaluation Method

Privacy-Preserving EHR Data Transformation via Geometric Operators: A Human-AI Co-Design Technical Report

Authors: Maolin Wang, Beining Bao, Gan Yuan, Hongyu Chen, Bingkun Zhao, Baoshuo Kan, Jiming Xu, Qi Shi, Yinggong Zhao, Yao Wang, Wei Ying Ma, Jun Yan | Published: 2026-03-24
Data Privacy Assessment
Privacy Leakage
Evaluation Method

CIPL: A Target-Independent Framework for Channel-Inversion Privacy Leakage in Agents

Authors: Tao Huang, Chen Hou, Jiayang Meng | Published: 2026-03-24
Privacy Leakage
Model Inversion
Evaluation Method

Structured Visual Narratives Undermine Safety Alignment in Multimodal Large Language Models

Authors: Rui Yang Tan, Yujia Hu, Roy Ka-Wei Lee | Published: 2026-03-23
マルチモーダル安全性
Large Language Model
Evaluation Method

Auditing MCP Servers for Over-Privileged Tool Capabilities

Authors: Charoes Huang, Xin Huang, Amin Milani Fard | Published: 2026-03-23
Dynamic Analysis
Evaluation Method
Static Analysis